Paci, Federica Maria Francesca
 Distribuzione geografica
Continente #
EU - Europa 748
NA - Nord America 719
AS - Asia 341
OC - Oceania 5
AF - Africa 4
SA - Sud America 4
Totale 1.821
Nazione #
US - Stati Uniti d'America 713
CN - Cina 231
GB - Regno Unito 141
SE - Svezia 109
FR - Francia 100
IE - Irlanda 100
IT - Italia 85
RU - Federazione Russa 79
SG - Singapore 68
UA - Ucraina 44
DE - Germania 38
FI - Finlandia 22
VN - Vietnam 15
NL - Olanda 13
BE - Belgio 12
MY - Malesia 9
CA - Canada 6
IN - India 5
AU - Australia 3
KR - Corea 3
ZA - Sudafrica 3
BR - Brasile 2
CH - Svizzera 2
CL - Cile 2
GU - Guam 2
KZ - Kazakistan 2
SA - Arabia Saudita 2
TR - Turchia 2
AZ - Azerbaigian 1
BD - Bangladesh 1
HK - Hong Kong 1
KE - Kenya 1
NO - Norvegia 1
RO - Romania 1
RS - Serbia 1
TH - Thailandia 1
Totale 1.821
Città #
Chandler 190
Jacksonville 161
Southend 140
Dublin 100
Lawrence 43
Princeton 43
Wilmington 42
Singapore 39
Beijing 37
Shenyang 30
Verona 27
Nanjing 23
Ashburn 20
Helsinki 18
Jinan 16
Hebei 15
Ann Arbor 14
Brussels 12
Falls Church 12
Nanchang 12
Dong Ket 11
San Francisco 10
Kuala Lumpur 9
Sindelfingen 9
Haikou 8
Ningbo 8
Norwalk 8
Augsburg 7
Changsha 7
Jiaxing 7
Redmond 7
Fairfield 6
Leipzig 6
Tianjin 6
Lanzhou 5
Sittard 5
Toronto 5
Zhengzhou 5
Guangzhou 4
Hangzhou 4
Lappeenranta 4
Milan 4
Paris 4
Clearwater 3
Houston 3
Isola della Scala 3
Kyiv 3
Los Angeles 3
Miami 3
Muizenberg 3
Serra San Bruno 3
Taizhou 3
Vicenza 3
Almaty 2
Amsterdam 2
Bolzano 2
Bovolone 2
Condofuri 2
Daegu 2
Delhi 2
Julianadorp 2
Malmo 2
Mantova 2
Moscow 2
Naaldwijk 2
Naples 2
Rende 2
Riyadh 2
Saint Louis 2
Santa Rita 2
Sydney 2
Trento 2
Vigonza 2
Zhongxin 2
Aarau 1
Almere Stad 1
Bangkok 1
Belgrade 1
Bomporto 1
Brandenburg 1
Central 1
Charlotte 1
Chions 1
Columbus 1
Cosenza 1
Dallas 1
Dhaka 1
Faenza 1
Fontainebleau 1
Forest City 1
Fremont 1
Fuzhou 1
Groningen 1
Gwangju 1
Melbourne 1
Modesto 1
Mountain View 1
Nairobi 1
New York 1
Nuremberg 1
Totale 1.241
Nome #
Riskio: A Serious Game for Cyber Security Awareness and Education 78
Towards Adaptive Access Control 61
A secure framework for publishing virtual community contracts 61
Authorization and User Failure Resiliency for WS-BPEL Business Processes 60
Towards a High-interaction Physics-aware Honeynet for Industrial Control Systems 57
Access control enforcement for conversation-based web services 57
Access Control and Authorization Constraints for WS-BPEL 54
An Adaptive Access Control Model for Web Services 53
Group-Based Negotiations in P2P Systems 51
User Tasks and Access Control overWeb Services 50
An Access-Control Framework for WS-BPEL 49
Selecting a secure cloud provider-an empirical study and multi criteria approach 49
HoneyICS: A High-interaction Physics-aware Honeynet forIndustrial Control Systems 49
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals 46
Fuzzy-based approach to assess and prioritize privacy risks 46
Model comprehension for security risk assessment 45
Detecting Insider Threats: A Trust-Aware Framework 45
Collective privacy management in social networks 43
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain 43
An Experimental Comparison of Two Risk-Based Security Methods 42
ACConv -- An Access Control Model for Conversational Web Services 42
A Distributed Access Control System for Cloud Federations 41
Survey on Access Control for Community-Centered Collaborative Systems 41
An Interoperable Approach to Multifactor Identity Verification 41
A system for securing push-based distribution of XML documents 40
Access control in Internet-of-Things: A survey 40
Computer Aided Threat Identification 39
A Load Time Policy Checker for Open Multi-application Smart Cards 38
Formal Modelling of Data Integration Systems Security Policies 38
Verification of Access Control Requirements in Web Services Choreography 37
Evolution of Security Engineering Artifacts 37
Security for Web Services and Service-Oriented Architectures 36
Privacy-Aware Web Service Composition and Ranking 35
Privacy-Preserving Access Control in Cloud Federations 34
A privacy-preserving approach to policy-based content dissemination 33
PP-trust-X A system for privacy preserving trust negotiations 32
Preventing Information Inference in Access Control 32
PriMa: a comprehensive approach to privacy protection in social network sites 31
PriMa:An effective privacy protection mechanism for social networks 31
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices 30
Security triage: A report of a lean security requirements methodology for cost-effective security analysis 28
null 27
Privacy-Aware Web Service Composition and Ranking 27
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations 26
Trust establishment in the formation of Virtual Organizations 24
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment 14
A new, evidence-based, theory for knowledge reuse in security risk analysis 13
Mitigating Privilege Misuse in Access Control through Anomaly Detection 8
A Comprehensive Study on Third-Party User Tracking in Mobile Applications 7
Totale 1.941
Categoria #
all - tutte 9.235
article - articoli 4.254
book - libri 175
conference - conferenze 4.806
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 18.470


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020129 0 0 4 23 0 41 0 2 6 8 3 42
2020/2021357 42 67 9 53 47 44 5 4 16 9 41 20
2021/2022283 13 35 2 1 31 10 6 23 19 8 5 130
2022/2023623 55 86 60 83 48 152 7 25 68 15 15 9
2023/2024269 30 25 22 23 16 30 11 25 6 11 45 25
2024/2025104 60 40 4 0 0 0 0 0 0 0 0 0
Totale 1.941