BAIARDI, FABRIZIO ENRICO ERMINIO
 Distribuzione geografica
Continente #
NA - Nord America 9.802
AS - Asia 4.983
EU - Europa 4.402
SA - Sud America 713
AF - Africa 244
OC - Oceania 7
Continente sconosciuto - Info sul continente non disponibili 3
Totale 20.154
Nazione #
US - Stati Uniti d'America 9.452
IT - Italia 1.726
CN - Cina 1.692
SG - Singapore 1.446
SE - Svezia 745
HK - Hong Kong 683
BR - Brasile 593
BG - Bulgaria 371
DE - Germania 282
UA - Ucraina 276
VN - Vietnam 266
CA - Canada 265
TR - Turchia 254
GB - Regno Unito 237
KR - Corea 229
FI - Finlandia 180
RU - Federazione Russa 176
CH - Svizzera 122
NG - Nigeria 103
IN - India 100
FR - Francia 73
BD - Bangladesh 49
JP - Giappone 48
IQ - Iraq 41
NL - Olanda 40
MX - Messico 36
AR - Argentina 35
SA - Arabia Saudita 31
CI - Costa d'Avorio 27
PK - Pakistan 27
ZA - Sudafrica 26
BE - Belgio 24
EC - Ecuador 23
AT - Austria 21
PL - Polonia 21
VE - Venezuela 21
ID - Indonesia 19
MA - Marocco 19
GR - Grecia 17
SN - Senegal 16
UZ - Uzbekistan 16
BJ - Benin 13
CO - Colombia 13
ES - Italia 12
IE - Irlanda 10
JM - Giamaica 10
NO - Norvegia 9
UY - Uruguay 9
AE - Emirati Arabi Uniti 8
EG - Egitto 8
PT - Portogallo 8
CZ - Repubblica Ceca 7
IR - Iran 7
JO - Giordania 7
PY - Paraguay 7
RS - Serbia 7
TW - Taiwan 7
AL - Albania 6
AU - Australia 6
AZ - Azerbaigian 6
HU - Ungheria 6
RO - Romania 6
TT - Trinidad e Tobago 6
CL - Cile 5
CM - Camerun 5
DO - Repubblica Dominicana 5
HN - Honduras 5
HR - Croazia 5
MY - Malesia 5
NP - Nepal 5
TN - Tunisia 5
BB - Barbados 4
DK - Danimarca 4
EE - Estonia 4
KE - Kenya 4
LT - Lituania 4
OM - Oman 4
PA - Panama 4
CR - Costa Rica 3
CY - Cipro 3
ET - Etiopia 3
EU - Europa 3
GT - Guatemala 3
IL - Israele 3
PE - Perù 3
QA - Qatar 3
SD - Sudan 3
TH - Thailandia 3
BH - Bahrain 2
CG - Congo 2
GE - Georgia 2
GY - Guiana 2
IS - Islanda 2
KG - Kirghizistan 2
LB - Libano 2
LK - Sri Lanka 2
LY - Libia 2
MN - Mongolia 2
PH - Filippine 2
PS - Palestinian Territory 2
Totale 20.128
Città #
Woodbridge 1.052
Ann Arbor 939
Ashburn 847
Singapore 801
Houston 728
Fairfield 710
Hong Kong 665
Chandler 626
Milan 616
Santa Clara 595
Jacksonville 383
Sofia 370
Beijing 336
Seattle 326
Hefei 306
Dallas 281
Wilmington 278
Shanghai 274
Cambridge 249
Ottawa 225
Seoul 217
New York 192
Izmir 180
Boardman 165
Serra 147
Los Angeles 145
Princeton 142
Lawrence 139
Nanjing 124
Bern 120
Florence 117
Lagos 102
Pisa 88
Rome 86
Chicago 85
Des Moines 72
Buffalo 70
Jüchen 65
London 64
Medford 60
Dearborn 58
Ho Chi Minh City 58
Dong Ket 55
Istanbul 52
Redwood City 52
Council Bluffs 49
São Paulo 47
Redondo Beach 46
Nanchang 44
Phoenix 41
Tokyo 39
San Diego 33
Fuzhou 31
Helsinki 30
Changsha 29
Hanoi 29
Abidjan 27
Boulder 27
Kunming 27
Düsseldorf 23
Schwalbach 23
Montegranaro 22
Shenyang 21
Brussels 20
Hangzhou 20
Norwalk 20
Paris 19
San Jose 19
Bremen 18
Guangzhou 18
Ogden 18
Pune 18
Quanzhou 18
Tianjin 17
Baghdad 16
Dakar 16
Hebei 16
Orange 16
Vienna 16
Jiaxing 15
Marseille 15
Jeddah 14
Pistoia 14
Cotonou 13
Dhaka 13
Rio de Janeiro 13
Tashkent 13
The Dalles 13
Warsaw 13
Amsterdam 12
Belo Horizonte 12
Falkenstein 12
Livorno 12
Munich 12
Brooklyn 11
Columbus 11
Johannesburg 11
Lucca 11
Salvador 11
Washington 11
Totale 14.397
Nome #
Q-Learning and Redundancy Reduction in Classifier Systems with Internal State 237
Q-learning in evolutionary rule based systems 231
Q-Learning and Parallelism in Evolutionary Rule-Based Systems 219
SEAS, a secure e-voting protocol: design and implementation 211
Architettura dei Sistemi di Elaborazione - Vol.1: Fondamenti, Firmware, Architetture Parallele 204
Towards High Assurance Networks of Virtual Machines 203
Mechanisms for a robust multiprocessing environment in the MuTEAM kernel 199
Resilience of Critical Infrastructure Systems to Hybrid Threats with Information Disruption 191
Concurrent programming tools for the MUTEAM multimicroprocessor system 188
Assessing and Managing Risk by Simulating Attack Chains 188
A Static Analysis to Order Instructions of a Concurrent Program 187
Assessing the Risk of an Information Infrastructure through Security Dependencies 185
COLLECTING REMOTE DATA IN IRREGULAR PROBLEMS WITH HIERARCHICAL REPRESENTATION OF THE DOMAIN 185
Structuring Process for a Cooperative Approach to Fault-Tolerant Distributed Software 184
A hierarchical approach to irregular problems 182
Static Checking of Interprocess Communication in ECSP 181
A Data Driven Static Model for the Execution of Logic Programs on Dist. Memory Systems 181
Improving Responsiveness by Locality in Distribited Virtual Environments 180
Concurrent Programming Tools for the MuTEAM Microprocessor System 179
Sequential pattern mining for ICT risk assessment and management 179
Security and Integrity of a Distributed File Storage in a Virtual Environment 178
DISTRIBUTED IMPLEMENTATION OF NESTED COMMUNICATING SEQUENTIAL PROCESSES - COMMUNICATION AND TERMINATION 177
Hierarchical Model Based Risk Management of Critical Infrastructures 177
Semantic Attestation of Node Integrity in Overlays 177
A static approach to process mapping in massively parallel systems 176
Constrained Automata: A Formal Tool for Risk Assessment and Mitigation 176
Towards High Assurance Networks of Virtual Machines 176
Transparent Process Monitoring in a Virtual Environment 176
Building Trustworthy Intrusion Detection through VM Introspection 175
Constrained Automata: A formal tool for ICT risk assessment 175
Allocating Resources to the Search for Vulnerabilities In Information Infrastructures 174
CIDD: A Cloud Intrusion Detection Dataset For Cloud Computing and Masquerade Attacks, 174
Architettura dei sistemi di elaborazione 173
An Obfuscation-Based Approach Against Injection Attacks 173
Modeling and Managing Risk in Billing Infrastructures 172
Architettura dei Sistemi di Elaborazione - Vol. 2: Sistemi operativi, multiprocessori, sistemi distribuiti 170
Vulnerabilities, Attacks and Equilibria in Information Infrastructure 168
Assessing ICT risk through a Monte Carlo method 168
Assessing and Managing ICT Risk with Partial Information 168
U.S. Patent Application No. 15/213,111 A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT TECHNIQUE FOR MASQUERADE DETECTION IN STAND-ALONE AND CLOUD COMPUTING SYSTEMS 166
PIT: A Library for the Parallelization of Irregular Problems 164
Managing Critical Infrastructures through Virtual Network Communities 164
Hierarchical, Model-Based Risk Management of Critical Infrastructures 161
Development of a debugger for a concurrent language 161
Assessing and Managing the ICT Risk of Power Generation 161
A JAVA Support for Distributed Shared Memory on COW 160
PsycoTrace: Virtual and Transparent Monitoring of a Process Self 160
Attestation of integrity of overlay networks 160
Improving Responsiveness by Locality in Distributed Virtual Environments 159
A HIERARCHICAL INTRUSION DETECTION SYSTEM FOR CLOUDS: DESIGN AND EVALUATION 158
GVScan: Scanning Networks for Global Vulnerabilities 158
A Static Analysis to Order Instructions of a Concurrent Program 157
Haruspex—Simulation-driven Risk Analysis for Complex Systems 157
Locality in Load Balancing Policies for Massively Parallel System 154
A hierarchical, autonomous, and forecasting cloud IDS 154
The MuTEAM system: general guidelines 153
MPI on a Virtual Shared Memory 153
Parallel Hierarchical Radiosity:the PIT approach 153
Improving grid services security with fine grain policies 151
Automating the Assessment of ICT Risk 151
Iterative selection of countermeasures for intelligent threat agents 151
CONSTRAINED FINITE STATE AUTOMATA FOR RISK ANALYSIS AND ASSESSMENT, 150
Hive: Implementing a Virtual Distributed Shared Memory in Java 150
Static checking of interprocess communication in ECSP 148
A DATA-DRIVEN SEMI-GLOBAL ALIGNMENT TECHNIQUE FOR MASQUERADE DETECTION IN STAND-ALONE AND CLOUD COMPUTING SYSTEMS Inventors: Hesham Abdelazim Ismail Mohamed KHOLIDY Fabrizio Baiardi 148
General purpose massively parallel systems: the role of programming environments 146
SEAS: A Secure E-voting Applet System 146
Unbounded impacts and risk mitigation in billing infrastructures 145
Assessing the Risk of an Information Infrastructure through Security Dependencie 144
PWIM: an architectural model for OR-parallelism on distributed memory systems 143
A risk mitigation approach for autonomous cloud intrusion response system 141
P3M: a Virtual Machine Approach to Massively Parallel Computation 140
Congestion Prevention by Bounding in Distributed Memory Systems 139
Protecting personal data using smart contracts 139
Securing a Community Cloud 134
Architectural models and design methodologies for general-purpose highly-parallel computers 134
Blockchain Smart Contract for Scalable Data Sharing in IoT: A Case Study of Smart Agriculture 134
Pisa Parallel Processing Project on general-purpose highly-parallel computers. 132
Design of High decentralized operating systems 130
Semantics-Driven Introspection in a Virtual Environment 130
A Simulation-Driven Approach for Assessing Risks of Complex Systems 130
Securing Health Information Infrastructures through Overlays 129
CIDS: A framework for intrusion detection in cloud systems 129
Load Balancing by Domain Decomposition:the Bounded Neighbour Approach 128
Blockchain-based access control management for Decentralized Online Social Networks 128
Development of a Debugger for a Concurrent Language 125
QSec: Supporting Security Decisions on an IT Infrastructure 125
Evaluation of a Virtual Shared Memory Machine by the Compilation of Data Parallel Loops 124
Parallel hierarchical radiosity: the PIT approach 123
Considering Application Vulnerabilities in Risk Assessment and Management 122
Adaptive multigrid methods in MPI 122
DVSA and SHOB: Support to Shared Data Structures on Distributed Memory Architectures 120
Harùspex: Evaluating Risk without Data 120
A publish subscribe support for networked multiplayer games 120
Nested Hybrid Genetic Algorithms for System Configuration and Program Mapping in Massively Parallel Systems 117
An Extension of Haruspex to Cover Vulnerabilities in Application Environments 117
Selecting Countermeasures for ICT systems Before They are Attacked 116
PARALLELISM ISSUES IN MULTI - STYLE COMPUTERS 116
Development of a Debugger for a Concurrent Language 114
Sequential pattern mining for ICT risk assessment and prevention 112
Totale 15.773
Categoria #
all - tutte 52.169
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 52.169


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021744 0 0 0 0 0 83 106 107 92 91 86 179
2021/20221.552 13 84 54 103 323 235 55 128 59 22 135 341
2022/20231.819 227 226 127 187 263 198 23 147 231 7 168 15
2023/20241.841 308 230 214 158 288 218 49 52 18 55 64 187
2024/20254.196 44 163 70 237 383 425 339 236 293 531 445 1.030
2025/20263.237 591 640 527 466 485 528 0 0 0 0 0 0
Totale 20.364