Crispo, Bruno
 Distribuzione geografica
Continente #
NA - Nord America 12.791
AS - Asia 3.072
EU - Europa 3.015
SA - Sud America 624
AF - Africa 42
OC - Oceania 12
Continente sconosciuto - Info sul continente non disponibili 2
Totale 19.558
Nazione #
US - Stati Uniti d'America 12.707
SG - Singapore 1.568
CN - Cina 827
RU - Federazione Russa 562
BR - Brasile 537
UA - Ucraina 470
IT - Italia 460
SE - Svezia 381
GB - Regno Unito 269
FI - Finlandia 222
DE - Germania 188
VN - Vietnam 148
KR - Corea 143
LV - Lettonia 130
BG - Bulgaria 116
HK - Hong Kong 66
FR - Francia 60
CA - Canada 56
IN - India 52
TR - Turchia 52
ID - Indonesia 44
AR - Argentina 35
NL - Olanda 35
JP - Giappone 27
PL - Polonia 27
BD - Bangladesh 24
AT - Austria 23
JO - Giordania 19
MX - Messico 18
PK - Pakistan 15
UZ - Uzbekistan 15
ES - Italia 14
MY - Malesia 14
ZA - Sudafrica 14
BE - Belgio 13
CO - Colombia 12
LB - Libano 12
AU - Australia 10
IE - Irlanda 10
IQ - Iraq 10
PY - Paraguay 10
DZ - Algeria 9
AE - Emirati Arabi Uniti 7
MA - Marocco 7
PT - Portogallo 7
CL - Cile 6
EC - Ecuador 6
SA - Arabia Saudita 6
VE - Venezuela 6
GR - Grecia 5
PE - Perù 5
EG - Egitto 4
MD - Moldavia 4
UY - Uruguay 4
BO - Bolivia 3
CZ - Repubblica Ceca 3
DK - Danimarca 3
DO - Repubblica Dominicana 3
KE - Kenya 3
LT - Lituania 3
PH - Filippine 3
AL - Albania 2
AZ - Azerbaigian 2
BH - Bahrain 2
BY - Bielorussia 2
CR - Costa Rica 2
HU - Ungheria 2
IL - Israele 2
IR - Iran 2
KZ - Kazakistan 2
LK - Sri Lanka 2
NP - Nepal 2
PA - Panama 2
QA - Qatar 2
TH - Thailandia 2
BS - Bahamas 1
EE - Estonia 1
EU - Europa 1
JM - Giamaica 1
KH - Cambogia 1
MU - Mauritius 1
NC - Nuova Caledonia 1
NE - Niger 1
NZ - Nuova Zelanda 1
RO - Romania 1
RS - Serbia 1
SI - Slovenia 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
TW - Taiwan 1
UG - Uganda 1
XK - ???statistics.table.value.countryCode.XK??? 1
ZW - Zimbabwe 1
Totale 19.558
Città #
Fairfield 1.582
Ashburn 1.017
Jacksonville 967
Singapore 935
Chandler 910
Woodbridge 754
Seattle 706
Wilmington 672
Dallas 570
Houston 558
Ann Arbor 498
Cambridge 496
Columbus 385
Santa Clara 384
Princeton 293
San Mateo 289
Moscow 286
Beijing 224
Trento 167
New York 164
Riga 130
Dearborn 122
Los Angeles 116
Sofia 114
San Diego 92
Boardman 90
Chicago 89
Hefei 85
Buffalo 78
Lawrence 73
Hong Kong 61
Council Bluffs 59
Falls Church 59
Helsinki 54
Munich 42
São Paulo 42
London 40
Dong Ket 38
Norwalk 38
Ho Chi Minh City 36
Jakarta 36
Salt Lake City 34
Izmir 33
Boydton 23
Nanjing 23
Guangzhou 22
Hanoi 22
Kunming 22
Verona 22
Lappeenranta 21
Milan 20
Redondo Beach 20
Toronto 19
Warsaw 19
Washington 18
Tampa 17
Phoenix 16
San Paolo di Civitate 16
Tokyo 16
Bremen 15
Falkenstein 15
Rome 15
Vicenza 15
Vienna 15
Elk Grove Village 14
Stockholm 14
Tashkent 14
Trieste 14
Frankfurt am Main 13
Kuala Lumpur 13
Rio de Janeiro 13
Altamura 12
Kilburn 12
Atlanta 11
Belo Horizonte 11
Brooklyn 11
Chennai 11
Curitiba 11
Düsseldorf 11
Jinan 11
Johannesburg 11
Nanchang 11
Nuremberg 11
Shanghai 11
Des Moines 10
Guarulhos 10
Poplar 10
Amsterdam 9
Chongqing 9
Montreal 9
Orem 9
Porto Alegre 9
San Francisco 9
Zhengzhou 9
Ankara 8
Brasília 8
Como 8
Costa Mesa 8
Mexico City 8
Ottawa 8
Totale 14.190
Nome #
SNAPAUTH: A Gesture-based Unobtrusive Smartwatch User Authentication Scheme 206
OAuth 2.0 Redirect URI Validation Falls Short, Literally 192
Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access 188
Time in Privacy Preserving LBSs: An Overlooked Dimension 183
DriverAuth: Behavioral Biometric-based Driver Authentication Mechanism for On-demand Ride and Ridesharing Infrastructure 180
A chimerical dataset combining physiological and behavioral biometric traits for reliable user authentication on smart devices and ecosystems 180
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware 174
ANSWERAUTH: A bimodal behavioral biometric-based user authentication scheme for smartphones 168
Access control via lightweight ontologies 161
A Perspective Study Towards Biometric-based Rider Authentication Schemes For Driverless Taxis 159
Internet of Things: A survey on the security of IoT frameworks 155
Dialerauth: A motion-assisted touch-based smartphone user authentication scheme 152
AirSign: A Gesture-Based Smartwatch User Authentication 149
null 149
Age, gender and operating-hand estimation on smart mobile devices 146
VLOC: An Approach To Verify The Physical Location Of A Virtual Machine In Cloud 145
A service-based context management framework for cross-enterprise collaboration 145
A Secure and Scalable Grid-Based Content Management System 145
Design and implementation of a confidentiality and access control solution for publish/subscribe systems 143
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 143
Smarthandle: A novel behavioral biometric-based authentication scheme for smart lock systems 143
Mobile biometrics: Towards a comprehensive evaluation methodology 141
P-CDN: Extending Access Control Capabilities of P2P Systems to provide CDN Services 140
An efficient weak secrecy scheme for network coding data dissemination in VANET 140
Providing Source Location Privacy in Wireless Sensor Networks: A Survey 139
Towards black box testing of android apps 139
MOSES: Supporting and Enforcing Security Profiles on Smartphones 138
ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments 137
A Risk-Driven Model to Minimize the Effects of Human Factors on Smart Devices 137
A New Family of Authentication Protocols 136
A Hybrid PKI-IBC Based Ephemerizer System 136
DEMO: Demonstrating the effectiveness of MOSES for separation of execution modes 136
A DRM security architecture for home networks 135
An implementation of event and filter confidentiality in pub/sub systems and its application to e-health 134
A Cost-Efficient Counter-Intrusion Scheme for One-Time Sensor Networks 133
Enforcing UCON Policies on the Enterprise Service Bus 133
FSquaDRA: Fast Detection of Repackaged Applications 133
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 132
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms 132
Reasoning about Relation Based Access Control 131
Deploy, Adjust and Readjust: Supporting Dynamic Reconfiguration of Policy Enforcement 130
Introducing concurrency in policy-based access control 130
FM 99.9, radio virus: Exploiting FM radio broadcasts for malware deployment 130
RelBAC: Relation Based Access Control 129
Evaluation of Motion-based Touch-typing Biometrics for online Banking 129
Privacy and Identity Management for Life 128
An efficient and scalable algorithm for policy compatibility in service virtualization 128
YAASE: Yet Another Android Security Extension 128
Towards Run-Time Verification in Access Control 126
MASTER as a Security Management Tool for Policy Compliance 124
Bait your hook: a novel detection technique for keyloggers 124
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement 123
Censorship-resilient communications through information scattering 122
Analyzing Remote Server Locations for Personal Data Transfers in Mobile Apps 122
Enforcing Multi-user Access Policies to Encrypted Cloud Databases 121
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment 120
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System 120
Touchstroke: Smartphone user authentication based on touch-typing biometrics 120
Providing Confidentiality in Content-based Publish/subscribe Systems 119
Virtual private social networks and a facebook implementation 118
Sense-And-Trace: A Privacy Preserving Distributed Geolocation Tracking System. 118
Time Warp: How Time Affects Privacy in LBSs 118
Combining Enforcement Strategies in Service Oriented Architectures 117
ITSME: Multi-modal and Unobtrusive Behavioural User Authentication for Smartphones 117
CREPUSCOLO: A collusion resistant privacy preserving location verification system 116
Towards a Secure Application-Semantic Aware Policy Enforcement Architecture 116
Windows Mobile LiveSD Forensics. 115
Strong Authentication and Privacy with Standard Browsers 115
Weak Data Secrecy via Obfuscation in Network Coding Based Content Distribution 115
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System 115
Empirical analysis on the use of dynamic code updates in android and its security implications 115
Delegation Protocols for Electronic Commerce 114
Securely Replicated Web Documents. 114
Anonymous opinion exchange over untrusted social networks 114
Federated Authorization for Software-as-a-Service Applications. 113
Event handoff unobservability in WSN 113
RelBAC: Relation Based Access Control 113
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks 113
CRePE: Context-Related Policy Enforcement for Android 112
PIDGIN: Privacy-preserving interest and content sharing in opportunistic networks 112
Supporting complex queries and access policies for multi-user encrypted databases. 111
Events privacy in WSNs: A new model and its application 111
PrivICN: Privacy-preserving content retrieval in information-centric networking 111
WISE: Lightweight Intelligent Swarm Attestation Scheme for IoT (The Verifier's Perspective) 109
Hold and Sign: A Novel Behavioral Biometrics for Smartphone User Authentication 109
DLoc: Distributed Auditing for Data Location Compliance in Cloud 108
Multimodal smartphone user authentication using touchstroke, phone-movement and face patterns 108
RFID Malware: Design Principles and Examples 107
High Dictionary Compression for Proactive Password Checking 107
Optimal solutions for pairing services on smartphones: A strategy to minimize energy consumption 107
Taking Sensor Networks from the Lab to the Jungle 106
Individual Authentication in Multiparty Communications 105
Distributed computer system 105
Efficient integration of fine-grained access control and resource brokering in grid 104
Analyzing gateways' impact on caching for micro CDNs based on CCN 104
Please hold on: Unobtrusive user authentication using smartphone's built-in sensors 104
Chained Stream Authentication 103
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services 103
Towards a Theory of White-Box Security 102
Leveraging Parallel Communications for Minimizing Energy Consumption on Smartphones 101
Totale 12.899
Categoria #
all - tutte 89.265
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 647
selected - selezionate 0
volume - volumi 1.494
Totale 91.406


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.857 0 0 0 0 281 252 284 243 190 160 247 200
2021/20221.804 66 233 10 83 65 98 68 408 163 153 139 318
2022/20231.972 296 176 21 234 279 322 6 173 275 25 114 51
2023/2024939 68 88 59 57 81 222 69 32 12 56 52 143
2024/20253.466 20 32 136 702 190 498 52 284 311 580 270 391
2025/20263.240 488 192 1.138 1.140 282 0 0 0 0 0 0 0
Totale 19.953