PACI, Federica Maria Francesca
 Distribuzione geografica
Continente #
EU - Europa 1.833
NA - Nord America 1.360
AS - Asia 1.218
SA - Sud America 269
AF - Africa 44
OC - Oceania 5
Continente sconosciuto - Info sul continente non disponibili 1
Totale 4.730
Nazione #
US - Stati Uniti d'America 1.333
RU - Federazione Russa 964
SG - Singapore 527
CN - Cina 321
BR - Brasile 234
GB - Regno Unito 170
IT - Italia 139
HK - Hong Kong 124
SE - Svezia 113
VN - Vietnam 110
IE - Irlanda 106
FR - Francia 103
DE - Germania 76
UA - Ucraina 47
FI - Finlandia 41
NL - Olanda 23
IN - India 19
KR - Corea 18
ZA - Sudafrica 17
CA - Canada 16
ID - Indonesia 16
BD - Bangladesh 14
AR - Argentina 12
BE - Belgio 12
PL - Polonia 12
AT - Austria 10
JP - Giappone 10
MY - Malesia 9
BJ - Benin 8
IQ - Iraq 8
PK - Pakistan 8
TR - Turchia 8
EC - Ecuador 7
MX - Messico 7
ES - Italia 5
KE - Kenya 5
CH - Svizzera 4
KZ - Kazakistan 4
MA - Marocco 4
PE - Perù 4
TG - Togo 4
AU - Australia 3
CL - Cile 3
LT - Lituania 3
VE - Venezuela 3
AE - Emirati Arabi Uniti 2
AZ - Azerbaigian 2
CO - Colombia 2
EG - Egitto 2
GU - Guam 2
IL - Israele 2
IR - Iran 2
NP - Nepal 2
PS - Palestinian Territory 2
SA - Arabia Saudita 2
TN - Tunisia 2
TT - Trinidad e Tobago 2
UZ - Uzbekistan 2
AL - Albania 1
AM - Armenia 1
BO - Bolivia 1
CR - Costa Rica 1
DO - Repubblica Dominicana 1
GA - Gabon 1
GF - Guiana Francese 1
GY - Guiana 1
HU - Ungheria 1
JO - Giordania 1
KG - Kirghizistan 1
MG - Madagascar 1
NO - Norvegia 1
PH - Filippine 1
PY - Paraguay 1
QA - Qatar 1
RO - Romania 1
RS - Serbia 1
TH - Thailandia 1
XK - ???statistics.table.value.countryCode.XK??? 1
Totale 4.730
Città #
Moscow 335
Singapore 258
Dallas 193
Chandler 190
Jacksonville 161
Southend 140
Hong Kong 122
Dublin 106
Ashburn 99
Beijing 60
The Dalles 60
Verona 49
Lawrence 43
Princeton 43
Wilmington 42
Los Angeles 37
Ho Chi Minh City 30
Shenyang 30
Helsinki 28
Nanjing 23
Buffalo 22
Hanoi 22
Redondo Beach 19
New York 18
Jinan 17
Falkenstein 15
Hebei 15
Ann Arbor 14
Munich 13
São Paulo 13
Brussels 12
Falls Church 12
Nanchang 12
San Francisco 12
Warsaw 12
Belo Horizonte 11
Dong Ket 11
Jakarta 10
Tokyo 10
Brooklyn 9
Columbus 9
Denver 9
Johannesburg 9
Kuala Lumpur 9
Santa Clara 9
Sindelfingen 9
Changsha 8
Chennai 8
Cotonou 8
Curitiba 8
Haikou 8
London 8
Ningbo 8
Norwalk 8
Orem 8
Thái Nguyên 8
Tianjin 8
Vienna 8
Amsterdam 7
Augsburg 7
Jiaxing 7
Lappeenranta 7
Redmond 7
Fairfield 6
Guangzhou 6
Leipzig 6
Milan 6
Paris 6
Seattle 6
Toronto 6
Turku 6
Zhengzhou 6
Dhaka 5
Genoa 5
Hangzhou 5
Houston 5
Lanzhou 5
Montreal 5
Nairobi 5
Porto Alegre 5
Rio de Janeiro 5
Rome 5
Sittard 5
Atlanta 4
Boardman 4
Boston 4
Brasília 4
Council Bluffs 4
Da Nang 4
Des Moines 4
Haiphong 4
Lomé 4
Mumbai 4
Phoenix 4
Shanghai 4
Vicenza 4
Almaty 3
Ankara 3
Campinas 3
Casablanca 3
Totale 2.686
Nome #
An Adaptive Access Control Model for Web Services 155
Enhancing Safety and Privacy in Industry 4.0: The ICE Laboratory Case Study 149
Authorization and User Failure Resiliency for WS-BPEL Business Processes 130
Riskio: A Serious Game for Cyber Security Awareness and Education 129
Access Control and Authorization Constraints for WS-BPEL 128
A secure framework for publishing virtual community contracts 125
Access control enforcement for conversation-based web services 125
A system for securing push-based distribution of XML documents 124
Collective privacy management in social networks 124
HoneyICS: A High-interaction Physics-aware Honeynet forIndustrial Control Systems 117
Towards a High-interaction Physics-aware Honeynet for Industrial Control Systems 113
An Access-Control Framework for WS-BPEL 112
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain 111
ACConv -- An Access Control Model for Conversational Web Services 109
Access control in Internet-of-Things: A survey 108
A Load Time Policy Checker for Open Multi-application Smart Cards 107
A Distributed Access Control System for Cloud Federations 104
Fuzzy-based approach to assess and prioritize privacy risks 104
A privacy-preserving approach to policy-based content dissemination 103
An Interoperable Approach to Multifactor Identity Verification 103
Group-Based Negotiations in P2P Systems 103
An Experimental Comparison of Two Risk-Based Security Methods 100
An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices 99
A new, evidence-based, theory for knowledge reuse in security risk analysis 97
User Tasks and Access Control overWeb Services 93
Towards Adaptive Access Control 93
Evolution of Security Engineering Artifacts 91
Detecting Insider Threats: A Trust-Aware Framework 87
A Comprehensive Study on Third-Party User Tracking in Mobile Applications 84
Selecting a secure cloud provider-an empirical study and multi criteria approach 83
A real world study on employees' susceptibility to phishing attacks 80
Model comprehension for security risk assessment 78
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals 78
Survey on Access Control for Community-Centered Collaborative Systems 77
Security for Web Services and Service-Oriented Architectures 77
Privacy-Aware Web Service Composition and Ranking 77
Verification of Access Control Requirements in Web Services Choreography 76
PriMa:An effective privacy protection mechanism for social networks 73
Computer Aided Threat Identification 73
Preventing Information Inference in Access Control 70
Formal Modelling of Data Integration Systems Security Policies 70
Privacy-Preserving Access Control in Cloud Federations 68
Privacy-Aware Web Service Composition and Ranking 67
PP-trust-X A system for privacy preserving trust negotiations 65
PriMa: a comprehensive approach to privacy protection in social network sites 65
Model comprehension for security risk assessment: an empirical comparison of tabular vs. graphical representations 65
Security triage: A report of a lean security requirements methodology for cost-effective security analysis 64
Trust establishment in the formation of Virtual Organizations 64
Mitigating Privilege Misuse in Access Control through Anomaly Detection 60
Verifiable Hierarchical Key Assignment Schemes 57
On the Equivalence Between Graphical and Tabular Representations for Security Risk Assessment 49
IFTTT Privacy Checker 27
Combining Goal-Oriented and Problem-Oriented Requirements Engineering Methods 27
null 27
EEVi - framework for evaluating the effectiveness of visualization in cyber-security 22
Totale 4.866
Categoria #
all - tutte 18.146
article - articoli 8.402
book - libri 311
conference - conferenze 9.433
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 36.292


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021139 0 0 0 0 0 44 5 4 16 9 41 20
2021/2022283 13 35 2 1 31 10 6 23 19 8 5 130
2022/2023623 55 86 60 83 48 152 7 25 68 15 15 9
2023/2024269 30 25 22 23 16 30 11 25 6 11 45 25
2024/20251.001 60 40 25 147 57 72 97 71 108 75 88 161
2025/20262.028 204 148 202 516 806 152 0 0 0 0 0 0
Totale 4.866