BELLA, Giampaolo
 Distribuzione geografica
Continente #
EU - Europa 487
AS - Asia 202
NA - Nord America 156
OC - Oceania 45
AF - Africa 13
SA - Sud America 2
Totale 905
Nazione #
IT - Italia 165
US - Stati Uniti d'America 149
JP - Giappone 102
FR - Francia 94
DE - Germania 57
AU - Australia 45
GB - Regno Unito 33
BE - Belgio 30
FI - Finlandia 25
HK - Hong Kong 24
NL - Olanda 16
CN - Cina 15
IN - India 14
IE - Irlanda 12
DK - Danimarca 11
SA - Arabia Saudita 10
CI - Costa d'Avorio 9
CA - Canada 6
CH - Svizzera 6
SG - Singapore 6
ES - Italia 5
PK - Pakistan 5
PL - Polonia 5
SE - Svezia 5
TR - Turchia 5
UA - Ucraina 5
AT - Austria 4
CZ - Repubblica Ceca 4
IR - Iran 4
KR - Corea 4
VN - Vietnam 4
IQ - Iraq 3
TW - Taiwan 3
EE - Estonia 2
HU - Ungheria 2
RU - Federazione Russa 2
CL - Cile 1
EG - Egitto 1
HN - Honduras 1
HR - Croazia 1
LU - Lussemburgo 1
MA - Marocco 1
MY - Malesia 1
NG - Nigeria 1
PE - Perù 1
PH - Filippine 1
PT - Portogallo 1
RO - Romania 1
TH - Thailandia 1
ZA - Sudafrica 1
Totale 905
Città #
Nagoya 34
Catania 21
Brussels 20
Bunkyo-ku 20
Melbourne 20
Helsinki 18
Vittoria 15
Syracuse 14
Adelaide 12
Dublin 12
Hingham 12
Tokyo 12
Aci Catena 11
Boardman 11
Palermo 11
Ashburn 10
Central 10
Frankfurt am Main 10
Ghent 10
Messina 10
Riyadh 10
Abidjan 9
Amsterdam 9
Paris 9
San Jose 9
Bochum 8
Canberra 8
Rome 8
Frederiksberg 7
Sydney 7
Llanelli 6
Milan 6
Hong Kong 5
Kameido 5
London 5
Los Angeles 5
Tucson 5
Zurich 5
Amberg 4
Arakawa 4
Berlin 4
Bryn Mawr 4
Dong Ket 4
Hanover 4
Misterbianco 4
Osaka 4
Bedford 3
Bellevue 3
Bengaluru 3
Blackheath 3
Chiyoda-ku 3
Columbus 3
Copenhagen 3
Eching 3
Espoo 3
Guangzhou 3
Hatfield 3
Islamabad 3
Kingston upon Thames 3
Madrid 3
Marseille 3
Mumbai 3
Nantong 3
Nuremberg 3
Seattle 3
Shanghai 3
Shinagawa 3
Stuttgart 3
Tainan City 3
Toyoake 3
West Lafayette 3
Athens 2
Austin 2
Bellshill 2
Bristow 2
Budapest 2
Cankaya 2
Chandler 2
Chicago 2
Erbil 2
Foothill Ranch 2
Gloucester 2
Goleta 2
Halifax 2
Herndon 2
Hyderabad 2
Kamijima 2
Kirchzarten 2
Lappeenranta 2
Linz 2
Lund 2
Miami 2
Milazzo 2
Monroe 2
Munich 2
Paternò 2
Phoenix 2
Piscataway 2
Rawalpindi 2
Reutlingen 2
Totale 584
Nome #
Embedded Fuzzing: a Review of Challenges, Tools, and Solutions, file ee40233b-5e41-4e02-83b3-cfe409ccc889 461
Modelling human threats in security ceremonies, file e089ea4d-90cb-4a14-ae6a-ce693884a040 66
Perceptions of Beauty in Security Ceremonies, file 028b8729-aaf9-4a5e-a9a9-836cf6950b7e 47
Inductive Study of Confidentiality: for Everyone, file dfe4d227-2050-bb0a-e053-d805fe0a78d9 30
Multi-service Threats: Attacking and Protecting Network Printers and VoIP Phones alike, file 69c461d7-bbc1-4682-927b-0cc306bd28e0 28
A Double Assessment of Privacy Risks Aboard Top-Selling Cars, file 79a30c19-ec7c-44e5-9683-882d82a1e779 26
Poster: are you secure in your car?, file 89cbe302-08c4-4963-bd3b-0b2cccfb65fb 20
PETIoT: PEnetration Testing the Internet of Things, file 84318f18-3d01-42af-ae04-dd0e63c23bc7 19
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands, file b685ae62-6e42-426a-838f-9ff51067ab90 19
What Are The Threats? (Charting The Threat Models Of Security Ceremonies), file dfe4d22d-6750-bb0a-e053-d805fe0a78d9 17
Invalid certificates in modern browsers: A socio-technical analysis, file dfe4d22d-1fca-bb0a-e053-d805fe0a78d9 11
Embedded Fuzzing: a Review of Challenges, Tools, and Solutions, file 83ae43bd-95d2-441b-9196-6cef6a4a412b 10
Towards Grammatical Tagging for the Legal Language of Cybersecurity, file a10e301c-47e5-42ac-b82f-4dc00e7310ec 10
Distributed Backup through Information Dispersal, file dfe4d227-0669-bb0a-e053-d805fe0a78d9 9
An Investigation into the Beautification of Security Ceremonies, file dfe4d22d-0856-bb0a-e053-d805fe0a78d9 9
Perceptions of Beauty in Security Ceremonies, file 4ae62e35-5efa-4aa6-8f62-b95df711279f 8
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security, file 7b6350dc-aba4-4fc6-be28-179dc8cc4f60 8
null, file d454d112-c5e5-42a8-b801-2234656cb4be 7
Inductive Verification of Smartcard Protocols, file dfe4d226-f4be-bb0a-e053-d805fe0a78d9 7
Verifying the SET Registration Protocols, file dfe4d226-f4bf-bb0a-e053-d805fe0a78d9 7
What is Correctness of Security Protocols?, file dfe4d226-f87f-bb0a-e053-d805fe0a78d9 7
Augmented Risk Analysis, file dfe4d226-f97c-bb0a-e053-d805fe0a78d9 7
A Secure Exam Protocol Without Trusted Parties, file dfe4d22d-09f7-bb0a-e053-d805fe0a78d9 7
Towards an Integrated Penetration Testing Environment for the CAN Protocol, file d6b5cdef-acff-4214-9068-0feadb5c3b44 6
Verifying the SET Purchase Protocols, file dfe4d226-fcdf-bb0a-e053-d805fe0a78d9 6
The Principle of Guarantee Availability for Security Protocol Analysis, file dfe4d226-fd3d-bb0a-e053-d805fe0a78d9 6
Multi-Attacker Protocol Validation, file dfe4d226-fe2a-bb0a-e053-d805fe0a78d9 6
Accountability Protocols: Formalized and Verified, file dfe4d226-fbfd-bb0a-e053-d805fe0a78d9 5
Enhancing DSR maintenance with power awareness, file dfe4d227-2601-bb0a-e053-d805fe0a78d9 4
An Overview of the Verification of SET, file dfe4d227-277e-bb0a-e053-d805fe0a78d9 4
An Ontological Approach to Compliance Verification of the NIS 2 Directive, file 6d100d68-a7de-4e94-98a8-8b2a2ac6be39 3
The ontology for agents, systems and integration of services: OASIS version 2, file 79d1c8ed-0cad-4bb4-93a5-6dc76c3160e3 3
Service Security and Privacy as a Socio-Technical Problem, file dfe4d226-fedd-bb0a-e053-d805fe0a78d9 3
Enforcing Privacy in E-Commerce by Balancing Anonimity and Trust, file dfe4d227-27f0-bb0a-e053-d805fe0a78d9 3
Towards an Integrated Penetration Testing Environment for the CAN Protocol, file dda0f2eb-8776-4f65-b693-5a6c15722cf7 2
Retaliation Against Protocol Attacks, file dfe4d226-fa05-bb0a-e053-d805fe0a78d9 2
Evaluating the Device Reputation through Full Observation in MANETs, file dfe4d226-fa44-bb0a-e053-d805fe0a78d9 2
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology, file a32397f9-8a12-4239-9a5e-3e1b35f542ec 1
Papyrus-Based Safety Analysis Automatization, file b2a0606a-6aa4-4687-aa69-c8e10ce858aa 1
An Automated Method for the Ontological Representation of Security Directives, file d39bef43-9ecd-4f43-9376-9d6b8b314efb 1
Information Assurance for Security Protocols, file dfe4d226-f8d6-bb0a-e053-d805fe0a78d9 1
Soft Constraint Programming to Analysing Security Protocols, file dfe4d227-3445-bb0a-e053-d805fe0a78d9 1
Formal Correctness of Security Protocols, file dfe4d227-5efc-bb0a-e053-d805fe0a78d9 1
TOUCAN: A proTocol tO secUre Controller Area Network, file dfe4d22d-09f6-bb0a-e053-d805fe0a78d9 1
Cybersecurity's Way Forward: to get Beautiful or Invisible, file dfe4d22d-673f-bb0a-e053-d805fe0a78d9 1
Idea: A unifying theory for evaluation systems, file dfe4d22d-68fe-bb0a-e053-d805fe0a78d9 1
Security is Beautiful, file dfe4d22e-2443-bb0a-e053-d805fe0a78d9 1
Totale 905
Categoria #
all - tutte 1.946
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 1.946


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20215 0 0 0 0 0 0 1 0 0 0 0 4
2022/2023524 164 95 38 32 32 29 15 5 50 15 18 31
2023/2024375 22 47 22 23 24 53 42 48 15 76 3 0
Totale 905