CREMONINI, MARCO
 Distribuzione geografica
Continente #
EU - Europa 6.418
NA - Nord America 3.834
AS - Asia 2.594
SA - Sud America 235
OC - Oceania 158
AF - Africa 103
Continente sconosciuto - Info sul continente non disponibili 20
Totale 13.362
Nazione #
US - Stati Uniti d'America 3.743
GB - Regno Unito 1.916
IT - Italia 1.508
CN - Cina 974
SE - Svezia 954
DE - Germania 618
SG - Singapore 455
RU - Federazione Russa 269
HK - Hong Kong 252
IN - India 231
NL - Olanda 221
BR - Brasile 163
FR - Francia 162
AU - Australia 150
IE - Irlanda 150
UA - Ucraina 146
TR - Turchia 134
KR - Corea 109
FI - Finlandia 101
EU - Europa 85
ID - Indonesia 84
GR - Grecia 76
VN - Vietnam 72
DK - Danimarca 66
CA - Canada 60
NO - Norvegia 54
CO - Colombia 41
CH - Svizzera 35
JP - Giappone 32
MY - Malesia 32
PH - Filippine 31
IR - Iran 27
PK - Pakistan 26
TW - Taiwan 21
TH - Thailandia 20
PL - Polonia 19
RO - Romania 19
ES - Italia 18
BE - Belgio 17
ZA - Sudafrica 16
AT - Austria 15
MX - Messico 14
BD - Bangladesh 12
GH - Ghana 11
KE - Kenya 11
SA - Arabia Saudita 11
NG - Nigeria 10
DZ - Algeria 8
IQ - Iraq 8
UZ - Uzbekistan 8
CL - Cile 7
EC - Ecuador 7
NZ - Nuova Zelanda 7
OM - Oman 7
PT - Portogallo 7
AL - Albania 6
EG - Egitto 6
HU - Ungheria 6
MA - Marocco 6
AE - Emirati Arabi Uniti 5
BG - Bulgaria 5
HR - Croazia 5
IL - Israele 5
JO - Giordania 5
LK - Sri Lanka 5
NP - Nepal 5
AO - Angola 4
AR - Argentina 4
LT - Lituania 4
LV - Lettonia 4
PA - Panama 4
SC - Seychelles 4
SK - Slovacchia (Repubblica Slovacca) 4
TN - Tunisia 4
UG - Uganda 4
VE - Venezuela 4
BT - Bhutan 3
BY - Bielorussia 3
CM - Camerun 3
EE - Estonia 3
JM - Giamaica 3
PE - Perù 3
TZ - Tanzania 3
UY - Uruguay 3
AZ - Azerbaigian 2
BB - Barbados 2
BO - Bolivia 2
CR - Costa Rica 2
CZ - Repubblica Ceca 2
KG - Kirghizistan 2
KW - Kuwait 2
LU - Lussemburgo 2
NA - Namibia 2
PR - Porto Rico 2
QA - Qatar 2
RS - Serbia 2
SN - Senegal 2
AM - Armenia 1
BH - Bahrain 1
BJ - Benin 1
Totale 13.402
Città #
Southend 1.668
Milan 410
Singapore 261
Chandler 236
Wilmington 222
Hong Kong 218
Ashburn 194
Houston 183
Santa Clara 172
Beijing 167
Fairfield 162
Princeton 151
Ann Arbor 147
Council Bluffs 142
Dublin 142
Seattle 142
Jacksonville 136
Guangzhou 88
Redwood City 88
Woodbridge 83
Mountain View 79
Nanjing 79
Bengaluru 73
Cambridge 70
Frankfurt am Main 64
Rome 63
Redmond 62
Boardman 61
Andover 53
Medford 52
Munich 49
Serra 48
Des Moines 45
Jinan 45
Dearborn 42
Istanbul 42
Jakarta 42
Berlin 38
Sakarya 38
Bogotá 37
Shenyang 36
Stavanger 36
Bologna 33
Los Angeles 33
Eitensheim 31
Helsinki 30
Shanghai 29
Changsha 28
Columbus 26
Nanchang 26
Brisbane 25
Zola Predosa 25
Casalecchio di Reno 23
Hebei 22
The Dalles 22
Athens 20
Moscow 20
Somerville 20
New York 19
Tianjin 19
Tokyo 19
Voghera 19
Dallas 18
Cincinnati 17
Hanoi 17
Zhengzhou 17
Ho Chi Minh City 16
London 16
Cangzhou 15
Hangzhou 15
Mumbai 15
Sunnyvale 15
Niedernberg 14
Nuremberg 14
San Diego 14
Bari 13
Jiaxing 13
Manchester 13
Maranello 13
Ottawa 13
Saint Petersburg 13
St Louis 13
Sydney 13
São Paulo 13
Chicago 12
Hefei 12
Hyderabad 12
Kuala Lumpur 12
Lanzhou 12
Phoenix 12
Quanzhou 12
Taizhou 12
Verona 12
Central District 11
Ferrara di Monte Baldo 11
Fuzhou 11
Odernheim 11
Wuhan 11
Adelaide 10
Brussels 10
Totale 7.158
Nome #
Evaluating information security investments from attackers perspective: the return-on-attack (ROA) 1.028
0-day vulnerabilities and cybercrime 877
Understanding and influencing attackers’ decisions: implications for security investment strategies 406
Contingency planning management 399
Data visualization : Grafici, dashboard e mappe con Python 328
Measuring the accuracy of software vulnerability assessments: experiments with students and professionals 327
Network-based intrusion detection systems 314
Big Data Platform for Public Health Policies 314
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities 309
The coevolution of contagion and behavior with increasing and decreasing awareness 287
Big Data Analytics in Healthcare: Design and Implementation for a Hearing Aid Case 234
Balanced clustering for efficient detection of scientific plagiarism 231
Privacy on the Internet 231
A framework for financial botnet analysis 220
Controllability of social networks and the strategic use of random information 220
Location privacy protection through obfuscation-based techniques 207
An XML-based approach to combine firewalls and web services security specifications 206
The Dorothy project : an open botnet analysis framework for automatic tracking and activity visualization 202
The effect of security education and expertise on security assessments: the case of software vulnerabilities 200
Use of random topics as practical control signals in a social network model 200
Learning computer networking on open paravirtual laboratories 185
Privacy-enhanced identity management for e-services 179
Introducing serendipity in a social network model of knowledge diffusion 179
The asymmetric diffusion of trust between communities: simulations in dynamic social networks 178
A game theoretic approach to vulnerability patching 175
Privacy-enhanced location-based access control 174
Towards identity management for e-services 173
The architecture of a privacy-aware access control decision component 173
Semantics-aware perimeter protection 173
Security, privacy, and trust in mobile systems 171
Supporting location-based conditions in access control policies 171
A privacy-aware access control system 169
Access control in location-based services 165
The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks 164
Online Privacy 162
Negotiation protocols for LBAC systems 161
Semantic-Aware Perimeter Protection 161
Cloud security risk management 158
An obfuscation-based approach for protecting location privacy 153
Landscape-aware location-privacy protection in location-based services 151
Business continuity planning 148
Risks and benefits of signaling information system characteristics to strategic attackers 147
Using mobile agents for analyzing intrusion in computer networks 145
Security, privacy, and trust in mobile systems 142
Location-based metadata and negotiation protocols for LBAC in a one-to-many scenario 139
Net privacy 138
Self-organizing techniques for knowledge diffusion in dynamic social networks 138
Managing privacy in location-based access control systems 134
A middleware architecture for integrating privacy preferences and location accuracy 131
Business continuity planning 130
Role of signaling in information warfare 129
Disaster recovery planning 128
Privacy-enhanced location services information 127
Location privacy in pervasive computing 127
Privacy in the electronic society : emerging problems and solutions 125
Improving hearing healthcare with big data analytics of real-time hearing aid data 125
Modifying trust dynamics through cooperation and defection in evolving social networks 122
Mobile agents integrity for electronic commerce applications 113
Productivity and patterns of activity in bug bounty programs: Analysis of hackerone and Google vulnerability research 109
The dynamical formation of ephemeral groups on networks and their effects on epidemics spreading 107
Multi-agent systems on the internet: extending the scope of coordination towards security and topology 98
Coordination and access control in open distributed agent systems: The TuCSoN approach 97
Managing privacy in LBAC systems 95
Models and Methods for the Analysis of the Diffusion of Skills in Social Networks 95
null 94
The New Frontiers of Social Simulation in the Data Science Era: An Introduction to the Proceedings 84
Fondamenti di data science : Python, R e open data 81
Cloud Security Risk Management 81
The Unknown of the Pandemic: An Agent-based Model of Final Phase Risks 79
Data Science Fundamentals with R, Python, and Open Data 63
A Critical Take on Privacy in a Datafied Society 62
Data Visualization in R and Python 57
Online Privacy 48
Beauty and the beast: Hacking for pleasure and profit 47
Building mobile agent applications in HiMAT 45
Modelling network topology and mobile agent interaction: an integrated framework 37
Coordination in context: Authentication, authorisation and topology in mobile agent applications 33
Melding abstractions with mobile agents 30
Ruling agent motion in structured environments 30
Renaissance hackery? 26
Locality abstractions and security models in a Mobile Agent environment 21
Totale 14.022
Categoria #
all - tutte 34.705
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 34.705


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.703 50 105 143 85 250 105 86 74 212 203 257 133
2021/20221.418 87 73 55 208 67 160 95 73 136 74 146 244
2022/20231.395 200 163 122 110 186 239 51 81 102 27 81 33
2023/20241.139 43 78 69 97 121 145 74 72 63 104 108 165
2024/20252.458 163 214 121 166 222 106 124 301 133 221 176 511
2025/202670 70 0 0 0 0 0 0 0 0 0 0 0
Totale 14.022