BELLA, Giampaolo
 Distribuzione geografica
Continente #
NA - Nord America 5.735
EU - Europa 3.621
AS - Asia 3.546
SA - Sud America 623
AF - Africa 307
OC - Oceania 7
Continente sconosciuto - Info sul continente non disponibili 4
Totale 13.843
Nazione #
US - Stati Uniti d'America 5.518
SG - Singapore 1.742
RU - Federazione Russa 1.051
IT - Italia 972
CN - Cina 947
BR - Brasile 516
IE - Irlanda 485
UA - Ucraina 297
KR - Corea 270
VN - Vietnam 246
FR - Francia 183
CA - Canada 163
DE - Germania 147
FI - Finlandia 131
BE - Belgio 94
CI - Costa d'Avorio 92
NG - Nigeria 79
GB - Regno Unito 67
IN - India 66
JP - Giappone 58
SN - Senegal 53
NL - Olanda 40
AR - Argentina 35
BD - Bangladesh 35
PL - Polonia 33
MX - Messico 31
HK - Hong Kong 28
SE - Svezia 28
IQ - Iraq 27
BJ - Benin 22
EC - Ecuador 22
AT - Austria 21
PK - Pakistan 21
ZA - Sudafrica 21
TR - Turchia 18
ES - Italia 17
CH - Svizzera 16
UZ - Uzbekistan 16
VE - Venezuela 14
CO - Colombia 13
ID - Indonesia 13
AE - Emirati Arabi Uniti 12
SA - Arabia Saudita 12
KE - Kenya 9
EG - Egitto 8
CL - Cile 7
GR - Grecia 7
JM - Giamaica 7
PY - Paraguay 7
TN - Tunisia 7
DZ - Algeria 6
IR - Iran 6
LT - Lituania 6
MA - Marocco 6
AU - Australia 5
JO - Giordania 5
IL - Israele 4
KZ - Kazakistan 4
PA - Panama 4
RO - Romania 4
AZ - Azerbaigian 3
BO - Bolivia 3
CZ - Repubblica Ceca 3
EU - Europa 3
HR - Croazia 3
MY - Malesia 3
PE - Perù 3
PT - Portogallo 3
TT - Trinidad e Tobago 3
UY - Uruguay 3
AL - Albania 2
BG - Bulgaria 2
BY - Bielorussia 2
CR - Costa Rica 2
DO - Repubblica Dominicana 2
HU - Ungheria 2
NI - Nicaragua 2
NP - Nepal 2
NZ - Nuova Zelanda 2
PH - Filippine 2
RS - Serbia 2
AO - Angola 1
BW - Botswana 1
DK - Danimarca 1
GE - Georgia 1
GL - Groenlandia 1
GT - Guatemala 1
KG - Kirghizistan 1
LV - Lettonia 1
MD - Moldavia 1
MN - Mongolia 1
MZ - Mozambico 1
OM - Oman 1
SV - El Salvador 1
SY - Repubblica araba siriana 1
UG - Uganda 1
XK - ???statistics.table.value.countryCode.XK??? 1
YE - Yemen 1
Totale 13.843
Città #
Dallas 1.102
Singapore 983
Santa Clara 816
Dublin 485
Chandler 480
Moscow 431
Ashburn 367
San Jose 355
Hefei 336
Jacksonville 284
Seoul 269
Catania 261
Boardman 186
Palermo 154
Lauterbourg 138
Nanjing 117
Chicago 116
Helsinki 109
Lawrence 107
Andover 106
Cambridge 106
Toronto 93
Abidjan 92
Beijing 92
Brussels 92
Ho Chi Minh City 86
Los Angeles 84
New York 61
Hanoi 56
San Mateo 55
Tokyo 54
Dakar 53
Des Moines 49
Wilmington 49
Munich 47
Council Bluffs 45
Lagos 43
Messina 42
Rome 42
São Paulo 42
Grafing 41
Nanchang 36
Buffalo 35
Hebei 35
Milan 34
Saint Petersburg 34
Shenyang 32
Ottawa 29
Nuremberg 27
Montreal 24
Civitanova Marche 23
Seattle 23
Warsaw 23
Abuja 22
Cotonou 22
Changsha 21
Tianjin 20
Washington 20
Jiaxing 19
Amsterdam 18
Da Nang 18
Denver 18
Hong Kong 18
London 17
Caltagirone 16
Mascalucia 16
Chennai 15
Johannesburg 15
Orem 15
Rio de Janeiro 15
Atlanta 14
Belo Horizonte 14
Brasília 14
Lappeenranta 14
Port Harcourt 14
Tremestieri Etneo 14
Brooklyn 13
Frankfurt am Main 13
Houston 12
Melilli 12
Turin 12
Columbus 11
Richmond 11
Curitiba 10
Jinan 10
Naples 10
Norwalk 10
Poplar 10
Redondo Beach 10
San Francisco 10
The Dalles 10
Avola 9
Guayaquil 9
Haiphong 9
Hangzhou 9
Mumbai 9
Boston 8
Misterbianco 8
Paternò 8
Syracuse 8
Totale 9.511
Nome #
Human-Artificial Intelligent Threat Modelling in the Automotive Domain 256
WATA - A System for Written Authenticated though Anonymous Exams 216
A case of smart devices that compromise home cybersecurity 213
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands 192
PETIoT: PEnetration Testing the Internet of Things 167
Enhancing DSR maintenance with power awareness 140
Evaluating the Device Reputation through Full Observation in MANETs 133
Towards an Integrated Penetration Testing Environment for the CAN Protocol 132
Augmented Risk Analysis 132
A behaviouristic semantic approach to blockchain-based e-commerce 130
A Privacy Paradigm that Tradeoffs Anonymity and Trust 128
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology 127
Enforcing Privacy in E-Commerce by Balancing Anonimity and Trust 127
Car drivers’ privacy concerns and trust perceptions 120
Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS 120
An Overview of the Verification of SET 118
An Ontological Approach to Compliance Verification of the NIS 2 Directive 117
Multi-service Threats: Attacking and Protecting Network Printers and VoIP Phones alike 115
Accountability Protocols: Formalized and Verified 115
Vulnerability Assessment and Penetration Testing on IP camera 114
Distributed Backup through Information Dispersal 114
SecOnto: Ontological Representation of Security Directives 113
A meta-ontological approach to securing the semantic web data 113
Managing Reputation over MANETs 113
A Double Assessment of Privacy Risks Aboard Top-Selling Cars 111
TOUCAN: A proTocol tO secUre Controller Area Network 111
PECSo: A Privacy Enhancing Framework for Applications in the Automotive Domain 110
Towards the COSCA framework for "COnseptualing Secure CArs" 110
2017 Special Track on Computer Security 110
Demo: Implementing CAN bus security by TOUCAN 110
VoIP Can Still Be Exploited - Badly 108
A Protocol's Life after Attacks 108
Guiding cybersecurity compliance: An ontology for the NIS 2 directive 106
A socio-technical methodology for the security and privacy analysis of services 106
Advancing Assurance for Secure Distributed Communications 106
Information Assurance for Security Protocols 105
You Overtrust Your Printer 105
Distributed Backup through Information Dispersal 104
A proof of non-repudiation 103
Idea: A unifying theory for evaluation systems 103
A Socio-Technical Understanding of TLS Certificate Validation 101
A Secure Exam Protocol Without Trusted Parties 101
Privacy and modern cars through a dual lens 100
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security 100
Locating Mobile Nodes Within Logical Networks 99
CINNAMON: A Module for AUTOSAR Secure Onboard Communication 98
Trustworthy exams without trusted parties 97
The ontology for agents, systems and integration of services: OASIS version 2 96
Towards Grammatical Tagging for the Legal Language of Cybersecurity 96
Secure Routine: A Routine-Based Algorithm for Drivers Identification 95
Remote Management of Face-to-Face Written Authenticated Though Anonymous Exams 95
Verifying the SET Registration Protocols 94
An Investigation into the Beautification of Security Ceremonies 94
The Principle of Guarantee Availability for Security Protocol Analysis 93
Spreading of Reputation values in a Mobile Network 92
Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving 91
Editorial of the Special Track in Computer Security (2004) 90
Invalid certificates in modern browsers: A socio-technical analysis 90
Poster: are you secure in your car? 90
The Ontology for Agents, Systems and Integration of Services: recent advancements of OASIS 89
Enforcing Collaboration in MANET Routing Protocols 88
The VOCODES Kill Chain for Voice Controllable Devices 87
Cybersecurity's Way Forward: to get Beautiful or Invisible 86
Formal Correctness of Security Protocols 86
Papyrus-Based Safety Analysis Automatization 85
2019 Special track on computer security 84
Realistic Threats to Self-Enforcing Privacy 83
Analysing privacy analyses 82
Editorial of the Special Track on Computer Security (2010) 82
An Automated Method for the Ontological Representation of Security Directives 82
Modelling human threats in security ceremonies 80
The AILA Methodology for Automated and Intelligent Likelihood Assignment 80
What is Correctness of Security Protocols? 80
Attacking Each Other 80
Editorial of the Special Track in Computer Security 80
Protecting Voice-Controllable Devices Against Self-Issued Voice Commands 79
Security Protocol Deployment Risk 79
Foreword from the General Chairs 79
Guest Editors’ preface 78
Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers 78
Verifying the SET Purchase Protocols 78
Service Security and Privacy as a Socio-Technical Problem 78
Inductive Study of Confidentiality: for Everyone 77
Biometrics to Enhance Smartcard Security: Simulating MOC using TOC 77
Soft Constraint Programming to Analysing Security Protocols 77
Editorial of the Special Track on Computer Security (2009) 77
Perceptions of Beauty in Security Ceremonies 76
Editorial of the Special Track in Computer Security 76
Inductive Verification of Smartcard Protocols 76
Editorial of the Special Track in Computer Security (2002) 75
Retaliation Against Protocol Attacks 75
Editorial Message: Special track on computer security 75
Modelling the privacy landscape of the Internet of Vehicles 74
What Security for Electronic Exams 74
Interactive Simulation of Security Policies 73
Analyzing Delegation Properties 72
Retaliation: Can We Live with Flaws? 72
Getmewhere: A Location-Based Privacy-Preserving Information Service 72
Formal analysis of the kerberos authentication system 71
Smart Bulbs Can Be Hacked to Hack into Your Household 71
Totale 10.116
Categoria #
all - tutte 45.637
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 45.637


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202145 0 0 0 0 0 0 0 0 0 0 33 12
2021/2022715 91 106 0 6 111 3 116 22 71 0 40 149
2022/20231.533 119 61 34 100 141 267 12 247 430 28 58 36
2023/20241.034 33 209 64 35 54 127 17 39 6 190 174 86
2024/20253.079 20 311 210 120 611 404 200 112 237 300 211 343
2025/20266.448 427 570 1.219 344 957 1.164 712 142 382 395 136 0
Totale 14.071