BELLA, Giampaolo
 Distribuzione geografica
Continente #
NA - Nord America 4.922
AS - Asia 2.391
EU - Europa 2.189
SA - Sud America 522
AF - Africa 188
OC - Oceania 5
Continente sconosciuto - Info sul continente non disponibili 4
Totale 10.221
Nazione #
US - Stati Uniti d'America 4.757
SG - Singapore 1.084
CN - Cina 872
IT - Italia 712
IE - Irlanda 483
BR - Brasile 454
UA - Ucraina 294
KR - Corea 158
CA - Canada 147
DE - Germania 133
FI - Finlandia 130
RU - Federazione Russa 112
BE - Belgio 94
CI - Costa d'Avorio 92
VN - Vietnam 70
JP - Giappone 52
SN - Senegal 51
GB - Regno Unito 45
IN - India 37
NL - Olanda 33
FR - Francia 32
SE - Svezia 25
AR - Argentina 24
PL - Polonia 24
BD - Bangladesh 19
EC - Ecuador 19
AT - Austria 18
CH - Svizzera 15
ZA - Sudafrica 13
ES - Italia 12
ID - Indonesia 12
NG - Nigeria 12
UZ - Uzbekistan 12
TR - Turchia 11
IQ - Iraq 10
AE - Emirati Arabi Uniti 9
PK - Pakistan 9
CO - Colombia 8
HK - Hong Kong 8
SA - Arabia Saudita 8
GR - Grecia 7
MX - Messico 7
MA - Marocco 6
PY - Paraguay 6
TN - Tunisia 5
VE - Venezuela 5
IL - Israele 4
IR - Iran 4
KZ - Kazakistan 4
LT - Lituania 4
AU - Australia 3
CZ - Repubblica Ceca 3
EU - Europa 3
JM - Giamaica 3
KE - Kenya 3
AL - Albania 2
AZ - Azerbaigian 2
BG - Bulgaria 2
BY - Bielorussia 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
EG - Egitto 2
HR - Croazia 2
NZ - Nuova Zelanda 2
PA - Panama 2
PE - Perù 2
RO - Romania 2
TT - Trinidad e Tobago 2
UY - Uruguay 2
BO - Bolivia 1
CL - Cile 1
DK - Danimarca 1
GL - Groenlandia 1
JO - Giordania 1
KG - Kirghizistan 1
LV - Lettonia 1
MY - Malesia 1
MZ - Mozambico 1
NI - Nicaragua 1
NP - Nepal 1
PH - Filippine 1
RS - Serbia 1
UG - Uganda 1
XK - ???statistics.table.value.countryCode.XK??? 1
YE - Yemen 1
Totale 10.221
Città #
Dallas 1.097
Santa Clara 807
Singapore 585
Dublin 483
Chandler 480
Hefei 336
Jacksonville 284
Catania 227
Ashburn 215
Boardman 184
Seoul 158
Nanjing 117
Chicago 113
Helsinki 108
Lawrence 107
Andover 106
Cambridge 106
Palermo 97
Toronto 93
Abidjan 92
Brussels 92
Beijing 83
Los Angeles 60
San Mateo 55
Dakar 51
Des Moines 49
Tokyo 49
Wilmington 49
Munich 47
Grafing 41
New York 41
Rome 39
São Paulo 37
Nanchang 36
Hebei 35
Saint Petersburg 34
Shenyang 32
Ottawa 29
Council Bluffs 24
Civitanova Marche 23
Ho Chi Minh City 23
Nuremberg 23
Seattle 23
Milan 22
Changsha 21
Tianjin 20
Washington 20
Jiaxing 19
Moscow 16
Messina 15
Lappeenranta 14
Rio de Janeiro 14
Tremestieri Etneo 14
Warsaw 14
Belo Horizonte 13
Amsterdam 12
Brasília 12
Buffalo 12
Denver 12
Hanoi 12
London 12
Montreal 12
Brooklyn 11
Columbus 11
Richmond 11
Turin 11
Abuja 10
Jinan 10
Norwalk 10
Redondo Beach 10
The Dalles 10
Chennai 9
Curitiba 9
Hangzhou 9
San Francisco 9
Atlanta 8
Guayaquil 8
Johannesburg 8
Mumbai 8
Paternò 8
Syracuse 8
Vienna 8
Boston 7
Misterbianco 7
Pune 7
Charlotte 6
Den Haag 6
Fortaleza 6
Gabicce Mare 6
Liberty Lake 6
Mascalucia 6
Modica 6
Pozzo Di Gotto 6
Bogotá 5
Nanuet 5
Phoenix 5
Quito 5
Santo André 5
Sete Lagoas 5
Zurich 5
Totale 7.346
Nome #
Human-Artificial Intelligent Threat Modelling in the Automotive Domain 197
WATA - A System for Written Authenticated though Anonymous Exams 176
Alexa versus Alexa: Controlling Smart Speakers by Self-Issuing Voice Commands 142
A case of smart devices that compromise home cybersecurity 115
Evaluating the Device Reputation through Full Observation in MANETs 108
PETIoT: PEnetration Testing the Internet of Things 107
Towards an Integrated Penetration Testing Environment for the CAN Protocol 104
Augmented Risk Analysis 103
Enhancing DSR maintenance with power awareness 102
Enforcing Privacy in E-Commerce by Balancing Anonimity and Trust 95
Car drivers’ privacy concerns and trust perceptions 94
A Privacy Paradigm that Tradeoffs Anonymity and Trust 93
An Overview of the Verification of SET 92
Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS 91
Vulnerability Assessment and Penetration Testing on IP camera 90
Managing Reputation over MANETs 88
Information Assurance for Security Protocols 87
TOUCAN: A proTocol tO secUre Controller Area Network 85
Demo: Implementing CAN bus security by TOUCAN 85
A behaviouristic semantic approach to blockchain-based e-commerce 84
Distributed Backup through Information Dispersal 84
A Protocol's Life after Attacks 84
Towards the COSCA framework for "COnseptualing Secure CArs" 83
A Double Assessment of Privacy Risks Aboard Top-Selling Cars 83
Accountability Protocols: Formalized and Verified 82
A socio-technical methodology for the security and privacy analysis of services 82
Multi-service Threats: Attacking and Protecting Network Printers and VoIP Phones alike 81
2017 Special Track on Computer Security 81
VoIP Can Still Be Exploited - Badly 80
Advancing Assurance for Secure Distributed Communications 80
You Overtrust Your Printer 78
Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security 78
Privacy and modern cars through a dual lens 77
Analysing the microRNA-17-92/Myc/E2F/RB Compound Toggle Switch by Theorem Proving 77
A Behaviouristic Approach to Representing Processes and Procedures in the OASIS 2 Ontology 76
Idea: A unifying theory for evaluation systems 76
Verifying the SET Registration Protocols 76
SecOnto: Ontological Representation of Security Directives 75
Trustworthy exams without trusted parties 75
Invalid certificates in modern browsers: A socio-technical analysis 75
Distributed Backup through Information Dispersal 75
An Ontological Approach to Compliance Verification of the NIS 2 Directive 74
The Principle of Guarantee Availability for Security Protocol Analysis 74
A proof of non-repudiation 74
Towards Grammatical Tagging for the Legal Language of Cybersecurity 74
The ontology for agents, systems and integration of services: OASIS version 2 73
A Socio-Technical Understanding of TLS Certificate Validation 73
CINNAMON: A Module for AUTOSAR Secure Onboard Communication 72
Remote Management of Face-to-Face Written Authenticated Though Anonymous Exams 72
Secure Routine: A Routine-Based Algorithm for Drivers Identification 71
A Secure Exam Protocol Without Trusted Parties 71
Analysing privacy analyses 70
Cybersecurity's Way Forward: to get Beautiful or Invisible 70
Formal Correctness of Security Protocols 69
Verifying the SET Purchase Protocols 68
Enforcing Collaboration in MANET Routing Protocols 68
The VOCODES Kill Chain for Voice Controllable Devices 67
Realistic Threats to Self-Enforcing Privacy 67
Editorial of the Special Track on Computer Security (2010) 67
Locating Mobile Nodes Within Logical Networks 67
What is Correctness of Security Protocols? 65
The Ontology for Agents, Systems and Integration of Services: recent advancements of OASIS 64
Guest Editors’ preface 64
Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers 64
Attacking Each Other 64
Modelling human threats in security ceremonies 63
Guiding cybersecurity compliance: An ontology for the NIS 2 directive 63
Inductive Study of Confidentiality: for Everyone 63
Editorial of the Special Track in Computer Security 63
Foreword from the General Chairs 63
Editorial of the Special Track in Computer Security (2002) 63
Soft Constraint Programming to Analysing Security Protocols 63
Poster: are you secure in your car? 63
Editorial of the Special Track in Computer Security (2004) 62
The AILA Methodology for Automated and Intelligent Likelihood Assignment 61
Analyzing Delegation Properties 61
Biometrics to Enhance Smartcard Security: Simulating MOC using TOC 61
Perceptions of Beauty in Security Ceremonies 60
Editorial of the Special Track in Computer Security 60
Service Security and Privacy as a Socio-Technical Problem 60
An Investigation into the Beautification of Security Ceremonies 60
Interactive Simulation of Security Policies 59
Spreading of Reputation values in a Mobile Network 59
PECSo: A Privacy Enhancing Framework for Applications in the Automotive Domain 58
Editorial of the Special Track on Computer Security (2006) 58
Retaliation Against Protocol Attacks 58
Editorial of the Special Track on Computer Security (2009) 58
Editorial Message: Special track on computer security 58
2019 Special track on computer security 57
Invisible Security 57
Retaliation: Can We Live with Flaws? 57
Getmewhere: A Location-Based Privacy-Preserving Information Service 57
What Security for Electronic Exams 56
Lack of explicitness strikes back 56
Papyrus-Based Safety Analysis Automatization 55
Special Issue: Computer Security 55
Editorial of the Special Track in Computer Security (2003) 55
Towards Verifying Voter Privacy Through Unlinkability 55
Inductive Verification of Smartcard Protocols 55
Security Protocol Deployment Risk 54
Totale 7.524
Categoria #
all - tutte 38.322
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 38.322


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021366 0 0 0 0 167 6 42 0 97 9 33 12
2021/2022715 91 106 0 6 111 3 116 22 71 0 40 149
2022/20231.533 119 61 34 100 141 267 12 247 430 28 58 36
2023/20241.034 33 209 64 35 54 127 17 39 6 190 174 86
2024/20253.079 20 311 210 120 611 404 200 112 237 300 211 343
2025/20262.822 427 570 1.219 344 262 0 0 0 0 0 0 0
Totale 10.445