Crispo, Bruno
 Distribuzione geografica
Continente #
NA - Nord America 14.352
AS - Asia 5.290
EU - Europa 3.591
SA - Sud America 769
AF - Africa 109
OC - Oceania 18
Continente sconosciuto - Info sul continente non disponibili 3
Totale 24.132
Nazione #
US - Stati Uniti d'America 14.217
SG - Singapore 2.081
CN - Cina 966
VN - Vietnam 902
BR - Brasile 621
IT - Italia 572
RU - Federazione Russa 570
UA - Ucraina 476
SE - Svezia 392
KR - Corea 383
GB - Regno Unito 303
FR - Francia 261
FI - Finlandia 247
JP - Giappone 234
DE - Germania 221
LV - Lettonia 202
HK - Hong Kong 147
IN - India 133
BG - Bulgaria 116
CA - Canada 78
TR - Turchia 67
BD - Bangladesh 64
AR - Argentina 56
ID - Indonesia 52
NL - Olanda 51
IQ - Iraq 46
PL - Polonia 37
MX - Messico 34
ES - Italia 31
PK - Pakistan 30
ZA - Sudafrica 29
JO - Giordania 25
AT - Austria 23
UZ - Uzbekistan 23
EC - Ecuador 21
PH - Filippine 19
MA - Marocco 17
MY - Malesia 17
AU - Australia 16
BE - Belgio 16
CO - Colombia 16
EG - Egitto 16
PY - Paraguay 16
DZ - Algeria 14
IE - Irlanda 13
LB - Libano 13
CL - Cile 12
VE - Venezuela 12
AE - Emirati Arabi Uniti 11
TH - Thailandia 11
GR - Grecia 10
KZ - Kazakistan 10
PT - Portogallo 9
KE - Kenya 8
SA - Arabia Saudita 8
CZ - Repubblica Ceca 7
PE - Perù 7
AZ - Azerbaigian 6
NP - Nepal 6
TN - Tunisia 6
TW - Taiwan 6
DK - Danimarca 5
EE - Estonia 5
JM - Giamaica 5
UY - Uruguay 5
BH - Bahrain 4
CR - Costa Rica 4
DO - Repubblica Dominicana 4
LT - Lituania 4
MD - Moldavia 4
RO - Romania 4
AL - Albania 3
AO - Angola 3
BO - Bolivia 3
IL - Israele 3
IR - Iran 3
LK - Sri Lanka 3
OM - Oman 3
PA - Panama 3
TT - Trinidad e Tobago 3
BY - Bielorussia 2
CG - Congo 2
CY - Cipro 2
ET - Etiopia 2
HU - Ungheria 2
KG - Kirghizistan 2
KH - Cambogia 2
NG - Nigeria 2
QA - Qatar 2
RS - Serbia 2
SY - Repubblica araba siriana 2
TG - Togo 2
XK - ???statistics.table.value.countryCode.XK??? 2
BI - Burundi 1
BS - Bahamas 1
BW - Botswana 1
EU - Europa 1
GE - Georgia 1
HN - Honduras 1
HR - Croazia 1
Totale 24.117
Città #
Fairfield 1.582
Singapore 1.307
Ashburn 1.273
Jacksonville 968
Chandler 910
Woodbridge 754
Seattle 707
Wilmington 673
San Jose 591
Dallas 579
Houston 570
Ann Arbor 498
Cambridge 496
Santa Clara 398
Columbus 386
Princeton 293
San Mateo 289
Moscow 287
Ho Chi Minh City 256
Seoul 237
Beijing 232
Hanoi 219
Tokyo 216
Riga 202
New York 199
The Dalles 187
Los Angeles 176
Trento 173
Lauterbourg 172
Dearborn 122
Hong Kong 114
Sofia 114
Chicago 97
Boardman 94
San Diego 93
Buffalo 85
Hefei 85
Council Bluffs 76
Helsinki 75
Lawrence 74
Orem 64
Falls Church 59
São Paulo 54
Da Nang 52
London 49
Milan 45
Munich 44
Salt Lake City 39
Chennai 38
Dong Ket 38
Norwalk 38
Jakarta 37
Haiphong 34
Frankfurt am Main 33
Izmir 33
Rome 31
Warsaw 28
Verona 25
Nanjing 24
Boydton 23
Guangzhou 23
Toronto 23
Amsterdam 22
Kunming 22
Phoenix 22
Tashkent 22
Lappeenranta 21
Redondo Beach 20
Stockholm 20
Tampa 20
Atlanta 19
Denver 19
Washington 19
Manchester 18
Biên Hòa 17
Brooklyn 17
Montreal 17
Ankara 16
Elk Grove Village 16
Falkenstein 16
Johannesburg 16
San Paolo di Civitate 16
Bremen 15
Kuala Lumpur 15
New Delhi 15
Vicenza 15
Vienna 15
Paris 14
Poplar 14
Rio de Janeiro 14
St Louis 14
Thái Nguyên 14
Trieste 14
Nuremberg 13
Altamura 12
Belo Horizonte 12
Bắc Ninh 12
Curitiba 12
Hải Dương 12
Kilburn 12
Totale 17.312
Nome #
Internet of Things: A survey on the security of IoT frameworks 417
OAuth 2.0 Redirect URI Validation Falls Short, Literally 245
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme 233
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware 225
A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems 225
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access 216
Time in Privacy Preserving LBSs: An Overlooked Dimension 212
DriverAuth: Behavioral Biometric-based Driver Authentication Mechanism for On-demand Ride and Ridesharing Infrastructure 205
VLOC: An Approach To Verify The Physical Location Of A Virtual Machine In Cloud 201
ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones 189
Access control via lightweight ontologies 183
A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis 183
P-CDN: Extending Access Control Capabilities of P2P Systems to provide CDN Services 180
Privacy and Identity Management for Life 174
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 174
Dialerauth: A motion-assisted touch-based smartphone user authentication scheme 174
A Hybrid PKI-IBC Based Ephemerizer System 172
AirSign: A Gesture-Based Smartwatch User Authentication 172
Smarthandle: A novel behavioral biometric-based authentication scheme for smart lock systems 170
Providing Source Location Privacy in Wireless Sensor Networks: A Survey 169
A service-based context management framework for cross-enterprise collaboration 168
A Secure and Scalable Grid-Based Content Management System 168
A New Family of Authentication Protocols 165
Age, gender and operating-hand estimation on smart mobile devices 165
Mobile biometrics: Towards a comprehensive evaluation methodology 163
An efficient weak secrecy scheme for network coding data dissemination in VANET 162
MOSES: Supporting and Enforcing Security Profiles on Smartphones 161
Design and implementation of a confidentiality and access control solution for publish/subscribe systems 160
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health 160
Providing Confidentiality in Content-based Publish/subscribe Systems 160
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms 160
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 158
An efficient and scalable algorithm for policy compatibility in service virtualization 158
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments 156
Towards black box testing of android apps 155
FSquaDRA: Fast Detection of Repackaged Applications 155
A DRM security architecture for home networks 155
Federated Authorization for Software-as-a-Service Applications. 154
A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices 154
FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment 153
DEMO: Demonstrating the effectiveness of MOSES for separation of execution modes 153
Enforcing UCON Policies on the Enterprise Service Bus 152
YAASE: Yet Another Android Security Extension 152
Towards Run-Time Verification in Access Control 151
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement 149
null 149
A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks 148
PrivICN: Privacy-preserving content retrieval in information-centric networking 147
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors 147
Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption 147
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement 146
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps 146
Evaluation of Motion-based Touch-typing Biometrics for online Banking 146
Reasoning about Relation Based Access Control 145
Introducing concurrency in policy-based access control 144
RelBAC: Relation Based Access Control 144
StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications 144
CRePE: Context-Related Policy Enforcement for Android 142
Bait your hook: a novel detection technique for keyloggers 142
High Dictionary Compression for Proactive Password Checking 142
MASTER as a Security Management Tool for Policy Compliance 139
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment 139
Touchstroke: Smartphone user authentication based on touch-typing biometrics 139
Virtual private social networks and a facebook implementation 138
Censorship-resilient communications through information scattering 138
Empirical analysis on the use of dynamic code updates in android and its security implications 138
Combining Enforcement Strategies in Service Oriented Architectures 137
Enforcing Multi-user Access Policies to Encrypted Cloud Databases 136
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns 136
Time Warp: How Time Affects Privacy in LBSs 135
Taking Sensor Networks from the Lab to the Jungle 134
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones 134
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. 133
Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution 133
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 133
Windows Mobile LiveSD Forensics. 132
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System 132
CREPUSCOLO: A collusion resistant privacy preserving location verification system 131
Securely Replicated Web Documents. 131
SµV - the Security MicroVisor: a virtualisation-based security middleware for the Internet of Things 131
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System 130
Turning Teenagers into Stores 128
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture 128
Anonymous opinion exchange over untrusted social networks 128
DLoc: Distributed Auditing for Data Location Compliance in Cloud 128
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication 128
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-metal Embedded Devices 128
Strong Authentication and Privacy with Standard Browsers 127
Delegation Protocols for Electronic Commerce 127
CRêPE: A System for Enforcing Fine-Grained Context-Related Policies on Android 126
RelBAC: Relation Based Access Control 126
Events privacy in WSNs: A new model and its application 125
Event handoff unobservability in WSN 125
PIDGIN: Privacy-preserving interest and content sharing in opportunistic networks 125
SPEED: Secure provable erasure for class-1 IoT devices 125
Supporting complex queries and access policies for multi-user encrypted databases. 124
RFID Malware: Design Principles and Examples 122
Analyzing gateways' impact on caching for micro CDNs based on CCN 121
Distributed computer system 120
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective) 120
Totale 15.455
Categoria #
all - tutte 97.934
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 715
selected - selezionate 0
volume - volumi 1.646
Totale 100.295


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021607 0 0 0 0 0 0 0 0 0 160 247 200
2021/20221.804 66 233 10 83 65 98 68 408 163 153 139 318
2022/20231.972 296 176 21 234 279 322 6 173 275 25 114 51
2023/2024939 68 88 59 57 81 222 69 32 12 56 52 143
2024/20253.466 20 32 136 702 190 498 52 284 311 580 270 391
2025/20267.821 488 192 1.138 1.140 809 796 1.648 266 729 615 0 0
Totale 24.534