EGIDI, Lavinia
 Distribuzione geografica
Continente #
EU - Europa 1.220
NA - Nord America 1.004
AS - Asia 235
OC - Oceania 3
Continente sconosciuto - Info sul continente non disponibili 2
Totale 2.464
Nazione #
US - Stati Uniti d'America 995
IE - Irlanda 350
IT - Italia 246
SE - Svezia 185
DE - Germania 171
UA - Ucraina 121
CN - Cina 82
FI - Finlandia 69
HK - Hong Kong 43
SG - Singapore 39
FR - Francia 24
IN - India 24
GB - Regno Unito 19
VN - Vietnam 18
BE - Belgio 15
CA - Canada 9
TR - Turchia 9
IR - Iran 7
NL - Olanda 6
LK - Sri Lanka 4
RO - Romania 4
AU - Australia 3
SA - Arabia Saudita 3
EU - Europa 2
GR - Grecia 2
LU - Lussemburgo 2
NO - Norvegia 2
PK - Pakistan 2
RU - Federazione Russa 2
TH - Thailandia 2
KR - Corea 1
KZ - Kazakistan 1
LT - Lituania 1
PL - Polonia 1
Totale 2.464
Città #
Dublin 350
Jacksonville 221
Dearborn 109
Ann Arbor 97
Chandler 92
Wilmington 63
Hong Kong 42
Lawrence 41
Princeton 41
Andover 36
Beijing 34
Piemonte 31
Singapore 22
San Mateo 21
Turin 21
Dong Ket 18
Munich 17
Strasbourg 16
Ashburn 14
Woodbridge 14
Brussels 13
Bremen 12
Anzio 11
Carmagnola 11
Hefei 10
Kocaeli 9
Novara 9
Milan 8
Pisa 8
Rivoli 8
Fairfield 7
Helsinki 7
Odalengo Grande 7
Rome 7
Grafing 6
Kunming 6
Morgantown 6
Philadelphia 6
Guangzhou 5
Nanjing 5
Novi Ligure 5
Ottawa 5
Amsterdam 4
Collegno 4
Horia 4
Ja Ela 4
Los Angeles 4
Mülheim 4
Zanjan 4
Zhengzhou 4
Asti 3
Atlanta 3
Boardman 3
Bushey 3
Cambridge 3
College Park 3
Hebei 3
Houston 3
Norwalk 3
Resana 3
Sydney 3
Vercelli 3
Vigliano Biellese 3
Alba 2
Albignasego 2
Alcamo 2
Arona 2
Bangkok 2
Baotou 2
Belfast 2
Cassano Magnago 2
Dallas 2
Delft 2
Grafenhausen 2
Islamabad 2
London 2
Luxembourg 2
Medina 2
Mountain View 2
Nanchang 2
Noicattaro 2
Novosibirsk 2
Nuremberg 2
Paris 2
Redwood City 2
Sacramento 2
Winnipeg 2
Évry 2
Alessandria 1
Almaty 1
Alserio 1
Altavilla Monferrato 1
Alzano Lombardo 1
Aprica 1
Arezzo 1
Athens 1
Bangalore 1
Berlin 1
Chongqing 1
Clifton 1
Totale 1.604
Nome #
A Bayesian Network Approach for the Interpretation of Cyber Attacks to Power Systems 131
Analysis and Detection of Cyber Attack Processes targeting Smart Grids 104
Lightweight BWT and LCP merging via the gap algorithm 81
Analisi e rilevamento intelligente di processi di attacco alle Smart-Grid 81
Completeness, Structural Rules and Types 80
Quantifier Elimination for the Theory of p-adic numbers 77
The Lazy Call-by-value Lambda Calculus 74
External memory BWT and LCP computation for sequence collections with applications 71
The Complexity of the Theory of p-adic Numbers 67
Better Spaced Seeds Using Quadratic Residues 66
WEIGHTED ATTACK TREES FOR THE CYBERSECURITY ANALYSIS OF SCADA SYSTEMS 64
Multiple seeds sensitivity using a single seed with threshold 64
Operational, Denotational and Logical Descriptions: a Case Study, 63
Decentralized rate-limiting of outbound e-mail, 62
A methodology for qualitative/quantitative analysis of weighted attack trees 62
Spaced Seeds Design Using Perfect Rulers 60
Double exponential inseparability of Robinson subsystem Q+ 59
External memory BWT and LCP computation for sequence collections with applications 59
Evidence-Based Analysis of Cyber Attacks to Security Monitored Distributed Energy Resources 57
A modular approach to user-defined symbolic periodicities 56
A mathematical framework for the semantics of symbolic languages representing periodic time 54
Rilevamento di anomalie ed intrusion detection in architetture ICT di sistemi di controllo energetico 52
Authentication and access delegation with user-released certificates, 52
Bringing Multimedia Contents into MP3 Files, 52
From Digital Audiobook to Secure Digital Multimedia-book 51
Design and analysis of periodic multiple seeds 50
A lattice of classes of user-defined symbolic periodicities 49
A Modular Infrastructure for the Validation of Cyberattack Detection Systems 48
Lightweight merging of compressed indices based on BWT variants 47
Hilbert Function and Complexity Lower Bounds for Symmetric Boolean Functions 46
Modelling a secure agent with team automata, 46
A mathematical framework for the semantics of symbolic languages representing periodic time 45
Spaced seed design using perfect rulers 45
An Architecture to Securely Enrich and Distribute MP3 over the Internet 44
The digital restyling of audiobooks, 44
La posta elettronica. Considerazioni tecniche 44
A flexible approach to user-defined symbolic granularities in temporal databases 44
Space-Efficient Merging of Succinct de Bruijn Graphs 44
Minimal Information Disclosure in a Centralized Authorization System, 42
Learning to classify images by means of Iterated FunctionSystems, 37
Orthogonal Operators for User-Defined Symbolic Periodicities 37
Partially sighted signatures on large documents, 36
SecuriDN: a customizable GUI generating cybersecurity models for DER control architectures 29
Space Efficient Merging of de Bruijn Graphs and Wheeler Graphs 19
Multiparty-session-types Coordination for Core Erlang 14
Totale 2.509
Categoria #
all - tutte 12.269
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 12.269


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020456 0 1 39 0 80 81 98 38 52 14 46 7
2020/2021389 41 3 49 3 37 27 45 13 74 24 47 26
2021/2022318 8 3 41 36 12 2 44 5 16 3 65 83
2022/2023778 62 33 35 20 64 72 9 53 364 5 32 29
2023/2024248 23 28 27 5 43 0 43 12 5 11 12 39
2024/202565 23 42 0 0 0 0 0 0 0 0 0 0
Totale 2.509