DEGANO, PIERPAOLO
Distribuzione geografica
Continente | # |
---|---|
NA - Nord America | 1.197 |
EU - Europa | 422 |
AS - Asia | 235 |
AF - Africa | 28 |
OC - Oceania | 14 |
SA - Sud America | 13 |
Totale | 1.909 |
Nazione | # |
---|---|
US - Stati Uniti d'America | 1.158 |
IT - Italia | 120 |
DE - Germania | 83 |
FR - Francia | 73 |
CN - Cina | 72 |
VN - Vietnam | 35 |
CA - Canada | 34 |
RU - Federazione Russa | 30 |
GB - Regno Unito | 29 |
IN - India | 26 |
IL - Israele | 21 |
FI - Finlandia | 15 |
IE - Irlanda | 15 |
HK - Hong Kong | 12 |
AU - Australia | 11 |
ZA - Sudafrica | 11 |
NL - Olanda | 10 |
PK - Pakistan | 10 |
UA - Ucraina | 9 |
IR - Iran | 8 |
NG - Nigeria | 8 |
SG - Singapore | 8 |
ID - Indonesia | 7 |
AE - Emirati Arabi Uniti | 6 |
CL - Cile | 6 |
CZ - Repubblica Ceca | 6 |
PL - Polonia | 5 |
PT - Portogallo | 5 |
RO - Romania | 5 |
BE - Belgio | 4 |
BR - Brasile | 4 |
JO - Giordania | 4 |
JP - Giappone | 4 |
PH - Filippine | 4 |
TR - Turchia | 4 |
AN - Antille olandesi | 3 |
CH - Svizzera | 3 |
HR - Croazia | 3 |
KR - Corea | 3 |
NZ - Nuova Zelanda | 3 |
SE - Svezia | 3 |
AM - Armenia | 2 |
CO - Colombia | 2 |
CY - Cipro | 2 |
LK - Sri Lanka | 2 |
MA - Marocco | 2 |
MX - Messico | 2 |
SC - Seychelles | 2 |
AL - Albania | 1 |
AR - Argentina | 1 |
CI - Costa d'Avorio | 1 |
DZ - Algeria | 1 |
EG - Egitto | 1 |
ES - Italia | 1 |
ET - Etiopia | 1 |
GE - Georgia | 1 |
GR - Grecia | 1 |
IQ - Iraq | 1 |
IS - Islanda | 1 |
KH - Cambogia | 1 |
KZ - Kazakistan | 1 |
MZ - Mozambico | 1 |
TW - Taiwan | 1 |
Totale | 1.909 |
Città | # |
---|---|
Houston | 132 |
Fairfield | 79 |
Santa Cruz | 79 |
Ann Arbor | 74 |
Ashburn | 73 |
Buffalo | 58 |
Seattle | 48 |
Woodbridge | 45 |
Wilmington | 37 |
Serra | 33 |
Cambridge | 27 |
Dallas | 26 |
Chicago | 22 |
Beijing | 20 |
Bengaluru | 16 |
Boardman | 15 |
Dong Ket | 15 |
San Diego | 13 |
Dublin | 12 |
Mountain View | 12 |
New York | 12 |
Ottawa | 12 |
Hangzhou | 10 |
Helsinki | 10 |
Los Angeles | 10 |
Shanghai | 10 |
Toronto | 10 |
University Park | 10 |
Las Vegas | 9 |
Muizenberg | 9 |
Paris | 9 |
Abuja | 8 |
Des Moines | 8 |
Guangzhou | 8 |
Wuhan | 8 |
Costa Mesa | 7 |
Riva | 7 |
Boulder | 6 |
Champaign | 6 |
Saint Petersburg | 6 |
Torino | 6 |
Council Bluffs | 5 |
Duncan | 5 |
Henderson | 5 |
Jakarta | 5 |
London | 5 |
Phoenix | 5 |
Rome | 5 |
Singapore | 5 |
Calau | 4 |
Clearwater | 4 |
Hong Kong | 4 |
Lake Forest | 4 |
Milan | 4 |
San Francisco | 4 |
San Jose | 4 |
Turda | 4 |
Wenzhou | 4 |
Amman | 3 |
Bursa | 3 |
Columbus | 3 |
Dearborn | 3 |
Denver | 3 |
Frankfurt am Main | 3 |
Gujranwala | 3 |
Lahore | 3 |
Lappeenranta | 3 |
Lisbon | 3 |
Mcallen | 3 |
Montagny | 3 |
Nürnberg | 3 |
Sena | 3 |
Stavropol | 3 |
Willemstad | 3 |
Amsterdam | 2 |
Auckland | 2 |
Bangalore | 2 |
Barga | 2 |
Berlin | 2 |
Bonn | 2 |
Brisbane | 2 |
Bristol | 2 |
Busalla | 2 |
Capannori | 2 |
Castelletto | 2 |
Crugers | 2 |
Dulles | 2 |
Florence | 2 |
Forlì | 2 |
Gatineau | 2 |
Grenoble | 2 |
Hartford | 2 |
Islamabad | 2 |
Karachi | 2 |
Kish | 2 |
Melbourne | 2 |
Monmouth Junction | 2 |
Montreal | 2 |
Norwalk | 2 |
Passau | 2 |
Totale | 1.193 |
Nome | # |
---|---|
Language-Independent Synthesis of Firewall Policies, file e0d6c92e-b6b0-fcf8-e053-d805fe0aa794 | 178 |
Context-aware security: Linguistic mechanisms and static analysis, file e0d6c927-afd7-fcf8-e053-d805fe0aa794 | 159 |
A Context-Oriented Extension of F#., file e0d6c927-5e2c-fcf8-e053-d805fe0aa794 | 137 |
Security Metrics at Work on the Things in IoT Systems, file e0d6c92e-70a2-fcf8-e053-d805fe0aa794 | 137 |
A Step Towards Checking Security in IoT, file e0d6c927-a5ba-fcf8-e053-d805fe0aa794 | 132 |
Revealing the trajectories of KLAIM tuples, statically, file e0d6c92d-b37d-fcf8-e053-d805fe0aa794 | 124 |
Experimenting with a Context-Aware Language, file e0d6c92d-0088-fcf8-e053-d805fe0aa794 | 118 |
null, file e0d6c92c-f6e9-fcf8-e053-d805fe0aa794 | 110 |
Linguistic Mechanisms for Context-Aware Security, file e0d6c92d-3110-fcf8-e053-d805fe0aa794 | 110 |
A Quantitative Study of Two Attacks, file e0d6c927-6b5a-fcf8-e053-d805fe0aa794 | 108 |
Last Mile’s Resources, file e0d6c92c-e7fb-fcf8-e053-d805fe0aa794 | 108 |
Where Do Your IoT Ingredients Come From?, file e0d6c927-b544-fcf8-e053-d805fe0aa794 | 89 |
Transcompiling Firewalls, file e0d6c92d-37a9-fcf8-e053-d805fe0aa794 | 85 |
Firewall Management With FireWall Synthesizer, file e0d6c92a-438d-fcf8-e053-d805fe0aa794 | 73 |
From Natural Projection to Partial Model Checking and Back, file e0d6c92d-32c5-fcf8-e053-d805fe0aa794 | 68 |
Tool Supported Analysis of IoT, file e0d6c92c-eb85-fcf8-e053-d805fe0aa794 | 59 |
Automata for Specifying and Orchestrating Service Contracts, file e0d6c930-37b1-fcf8-e053-d805fe0aa794 | 57 |
Here you can't: context-aware security., file e0d6c927-6cb7-fcf8-e053-d805fe0aa794 | 44 |
Programming in a context-aware language, file e0d6c930-8f4f-fcf8-e053-d805fe0aa794 | 31 |
Natural Projection as Partial Model Checking, file e0d6c92f-5b29-fcf8-e053-d805fe0aa794 | 25 |
Security in Pervasive Applications: A Survey, file e0d6c92d-1b6b-fcf8-e053-d805fe0aa794 | 21 |
null, file e0d6c929-4c18-fcf8-e053-d805fe0aa794 | 18 |
Tracing where IoT data are collected and aggregated, file e0d6c930-7016-fcf8-e053-d805fe0aa794 | 6 |
Context-aware security: Linguistic mechanisms and static analysis, file e0d6c927-a878-fcf8-e053-d805fe0aa794 | 5 |
Names of the Pi-Calculus Agents Handled Locally, file e0d6c926-1c26-fcf8-e053-d805fe0aa794 | 3 |
Formalising Security in Ubiquitous and Cloud Scenarios, file e0d6c926-390f-fcf8-e053-d805fe0aa794 | 3 |
null, file e0d6c931-790f-fcf8-e053-d805fe0aa794 | 3 |
Static Validation of Security Protocols, file e0d6c926-1a59-fcf8-e053-d805fe0aa794 | 2 |
null, file e0d6c927-5e1f-fcf8-e053-d805fe0aa794 | 2 |
Where Do Your IoT Ingredients Come From?, file e0d6c927-a802-fcf8-e053-d805fe0aa794 | 2 |
Authentication Primitives for Refining Protocol Specifications, file e0d6c926-1f8b-fcf8-e053-d805fe0aa794 | 1 |
An Enhanced CFA for Security Policies, file e0d6c926-22b1-fcf8-e053-d805fe0aa794 | 1 |
Causality and replication in concurrent processes, file e0d6c926-28f7-fcf8-e053-d805fe0aa794 | 1 |
Constructing specific SOS semantics for concurrency via abstract interpretation, file e0d6c926-3256-fcf8-e053-d805fe0aa794 | 1 |
null, file e0d6c927-5dbf-fcf8-e053-d805fe0aa794 | 1 |
Process calculi for biological processes, file e0d6c92a-cec3-fcf8-e053-d805fe0aa794 | 1 |
Revealing the trajectories of KLAIM tuples, statically, file e0d6c92d-a8aa-fcf8-e053-d805fe0aa794 | 1 |
Are All Firewall Systems Equally Powerful?, file e0d6c92d-ed9c-fcf8-e053-d805fe0aa794 | 1 |
Totale | 2.025 |
Categoria | # |
---|---|
all - tutte | 4.718 |
article - articoli | 0 |
book - libri | 0 |
conference - conferenze | 0 |
curatela - curatele | 0 |
other - altro | 0 |
patent - brevetti | 0 |
selected - selezionate | 0 |
volume - volumi | 0 |
Totale | 4.718 |
Totale | Lug | Ago | Sett | Ott | Nov | Dic | Gen | Feb | Mar | Apr | Mag | Giu | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2018/2019 | 51 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 9 | 20 | 22 |
2019/2020 | 199 | 16 | 11 | 16 | 15 | 14 | 13 | 20 | 13 | 17 | 17 | 10 | 37 |
2020/2021 | 352 | 24 | 32 | 22 | 20 | 18 | 12 | 34 | 38 | 33 | 42 | 36 | 41 |
2021/2022 | 634 | 66 | 29 | 27 | 140 | 94 | 29 | 20 | 31 | 19 | 18 | 113 | 48 |
2022/2023 | 353 | 13 | 29 | 111 | 51 | 27 | 28 | 25 | 10 | 3 | 11 | 26 | 19 |
2023/2024 | 249 | 22 | 21 | 29 | 18 | 48 | 34 | 21 | 23 | 14 | 19 | 0 | 0 |
Totale | 2.025 |