ARDAGNA, CLAUDIO AGOSTINO
 Distribuzione geografica
Continente #
EU - Europa 6.690
NA - Nord America 5.235
AS - Asia 3.974
AF - Africa 609
OC - Oceania 310
SA - Sud America 250
Continente sconosciuto - Info sul continente non disponibili 17
Totale 17.085
Nazione #
US - Stati Uniti d'America 4.884
IT - Italia 1.685
DE - Germania 1.403
CN - Cina 1.174
GB - Regno Unito 933
IN - India 818
FR - Francia 725
NL - Olanda 340
CA - Canada 293
AU - Australia 267
IR - Iran 226
ID - Indonesia 190
MY - Malesia 188
PK - Pakistan 173
RU - Federazione Russa 163
ZA - Sudafrica 152
HK - Hong Kong 133
IE - Irlanda 130
KR - Corea 127
JP - Giappone 125
GR - Grecia 109
SG - Singapore 109
CZ - Repubblica Ceca 108
UA - Ucraina 108
BR - Brasile 107
SE - Svezia 107
ES - Italia 104
FI - Finlandia 103
BE - Belgio 97
AT - Austria 95
SA - Arabia Saudita 78
VN - Vietnam 77
CH - Svizzera 74
TW - Taiwan 73
TR - Turchia 72
PH - Filippine 70
RO - Romania 69
EG - Egitto 65
PT - Portogallo 65
JO - Giordania 59
DZ - Algeria 57
NO - Norvegia 56
AE - Emirati Arabi Uniti 55
KE - Kenya 54
TN - Tunisia 52
CO - Colombia 45
NG - Nigeria 41
PL - Polonia 40
MA - Marocco 35
MX - Messico 35
IL - Israele 34
NZ - Nuova Zelanda 34
AR - Argentina 32
ET - Etiopia 29
DK - Danimarca 27
CL - Cile 26
EU - Europa 26
MU - Mauritius 24
IQ - Iraq 22
PE - Perù 22
RS - Serbia 22
TH - Thailandia 21
MT - Malta 20
BD - Bangladesh 19
AL - Albania 17
GH - Ghana 17
LK - Sri Lanka 17
HR - Croazia 16
PS - Palestinian Territory 16
SK - Slovacchia (Repubblica Slovacca) 16
CY - Cipro 15
KW - Kuwait 13
OM - Oman 13
YT - Mayotte 12
EC - Ecuador 10
A1 - Anonimo 9
BG - Bulgaria 9
HU - Ungheria 9
QA - Qatar 9
SD - Sudan 9
ZW - Zimbabwe 9
FJ - Figi 8
KZ - Kazakistan 8
LT - Lituania 8
LU - Lussemburgo 8
MO - Macao, regione amministrativa speciale della Cina 8
NP - Nepal 8
BW - Botswana 7
SI - Slovenia 6
ZM - Zambia 6
CM - Camerun 5
IS - Islanda 5
PA - Panama 5
UG - Uganda 5
VE - Venezuela 5
AN - Antille olandesi 4
BJ - Benin 4
LV - Lettonia 4
MK - Macedonia 4
TZ - Tanzania 4
Totale 17.034
Città #
Ashburn 448
Milan 444
Houston 404
Fairfield 277
Newcastle upon Tyne 271
Beijing 256
Ann Arbor 214
Seattle 159
Woodbridge 146
Wilmington 143
Buffalo 139
Cambridge 106
Dublin 85
London 80
Santa Cruz 80
Jakarta 79
Munich 74
Dalmine 73
Mountain View 73
Hangzhou 71
Redmond 66
Singapore 61
Rome 59
Shanghai 59
Helsinki 57
Nürnberg 57
Bergamo 56
Chicago 56
Islamabad 56
Los Angeles 56
Ottawa 54
Boardman 53
Brussels 53
Mumbai 52
Bangalore 51
Chennai 51
Wuhan 51
Guangzhou 50
Central District 49
Athens 48
Bengaluru 47
Kuala Lumpur 46
Paris 46
Tianjin 46
Council Bluffs 44
Nanjing 43
Sydney 42
Hanoi 41
Melbourne 40
Vienna 40
Albany 39
Amsterdam 38
Richmond 37
San Jose 37
Taipei 37
Berlin 36
Columbus 36
Gurgaon 35
Hyderabad 35
Sunnyvale 35
Toronto 35
Monza 34
San Diego 34
Eindhoven 33
Modena 32
Phoenix 32
Simi Valley 32
Costa Mesa 31
Southend 31
Suri 31
Tehran 31
Villeurbanne 31
New York 30
Hamburg 29
Johannesburg 29
Montréal 28
Pune 28
Frankfurt am Main 27
Kolkata 27
Atlanta 26
Karlsruhe 26
New Delhi 25
San Francisco 25
Stuttgart 25
Bari 24
Delhi 24
Dallas 23
Duncan 23
Brescia 22
Jinan 22
Norwalk 22
Riyadh 22
Busto Arsizio 21
Central 21
San Mateo 21
Brisbane 20
Chester 20
Genoa 20
Hong Kong 20
Kumar 20
Totale 6.574
Nome #
Big data analytics as-a-service: Issues and challenges, file dfa8b997-8994-748b-e053-3a05fe0a3a96 2.681
From security to assurance in the cloud: a survey, file dfa8b992-f3d2-748b-e053-3a05fe0a3a96 2.389
A multi-path approach for k-anonymity in mobile hybrid networks, file dfa8b98e-f7a0-748b-e053-3a05fe0a3a96 1.708
Privacy-aware Big Data Analytics as a Service for Public Health Policies in Smart Cities, file dfa8b99a-0c49-748b-e053-3a05fe0a3a96 1.156
Location privacy protection through obfuscation-based techniques, file dfa8b990-e52b-748b-e053-3a05fe0a3a96 893
Access control for smarter healthcare using policy spaces, file dfa8b98f-9556-748b-e053-3a05fe0a3a96 888
Model-based Big Data Analytics-as-a-Service : Take Big Data to the Next Level, file dfa8b99a-de92-748b-e053-3a05fe0a3a96 757
Business intelligence meets big data : an overview on security and privacy, file dfa8b991-6786-748b-e053-3a05fe0a3a96 682
Using open source middleware for securing E-Gov applications, file dfa8b98e-f79a-748b-e053-3a05fe0a3a96 536
A trust assurance technique for Internet of things based on human behavior compliance, file dfa8b99e-52a6-748b-e053-3a05fe0a3a96 408
PrimeLife policy language, file dfa8b98f-7692-748b-e053-3a05fe0a3a96 388
Minimising disclosure of client information in credential-based interactions, file dfa8b98f-b2f5-748b-e053-3a05fe0a3a96 375
Test-based security certification of composite services, file dfa8b99d-09e9-748b-e053-3a05fe0a3a96 339
Stay Thrifty, Stay Secure: A VPN-based Assurance Framework for Hybrid Systems, file dfa8b9a4-101e-748b-e053-3a05fe0a3a96 310
Trustworthy IoT: An evidence collection approach based on smart contracts, file dfa8b9a0-097b-748b-e053-3a05fe0a3a96 309
Dynamic and Scalable Enforcement of Access Control Policies for Big Data, file dfa8b9a8-d56a-748b-e053-3a05fe0a3a96 256
Minimizing disclosure of private information in credential-based interactions : a graph-based approach, file dfa8b98f-9655-748b-e053-3a05fe0a3a96 249
Defining and matching test-based certificates in Open SOA, file dfa8b990-8a4c-748b-e053-3a05fe0a3a96 220
Cost-effective deployment of certified cloud composite services, file dfa8b9a0-56cd-748b-e053-3a05fe0a3a96 216
From Trustworthy Data to Trustworthy IoT: A Data Collection Methodology Based on Blockchain, file dfa8b9a4-d3c5-748b-e053-3a05fe0a3a96 202
Certification-Based Cloud Adaptation, file dfa8b99a-70e3-748b-e053-3a05fe0a3a96 198
Big Data Analytics-as-a-Service: Bridging the gap between security experts and data scientists, file dfa8b9a7-c865-748b-e053-3a05fe0a3a96 191
Towards pattern-based reliability certification of services, file dfa8b98f-56ca-748b-e053-3a05fe0a3a96 187
Web service assurance : the notion and the issues, file dfa8b98f-a224-748b-e053-3a05fe0a3a96 179
A semi-automatic and trustworthy scheme for continuous cloud service certification, file dfa8b997-d518-748b-e053-3a05fe0a3a96 166
Modeling time, probability, and configuration constraints for continuous cloud service certification, file dfa8b999-ad00-748b-e053-3a05fe0a3a96 164
A Continuous Certification Methodology for DevOps, file dfa8b9a1-00a6-748b-e053-3a05fe0a3a96 159
An Assurance-Based Risk Management Framework for Distributed Systems, file dfa8b9a9-80b7-748b-e053-3a05fe0a3a96 142
Towards an Assurance Framework for Edge and IoT Systems, file dfa8b9aa-26e9-748b-e053-3a05fe0a3a96 127
Scouting Big Data Campaigns using TOREADOR Labs, file dfa8b997-f367-748b-e053-3a05fe0a3a96 122
A security certification scheme for Information-Centric Networks, file dfa8b9aa-28db-748b-e053-3a05fe0a3a96 104
Bridging the Gap between Certification and Software Development, file ded7581d-92d9-4f3c-bf85-7cbc5cc2abd9 94
Supporting user privacy preferences on information release in open scenarios, file dfa8b98f-7c14-748b-e053-3a05fe0a3a96 85
Requirements and Challenges for Secure and Trustworthy UAS Collaboration, file c711bec7-8ecf-443b-b2b6-5cbddeb30357 71
Toward model-based big data-as-a-service: The TOREADOR approach, file dfa8b999-d55b-748b-e053-3a05fe0a3a96 70
A Methodology for Non-Functional Property Evaluation of Machine Learning Models, file dfa8b9a7-09c9-748b-e053-3a05fe0a3a96 69
Semantic Support for Model Based Big Data Analytics-as-a-Service (MBDAaaS), file dfa8b99b-9b45-748b-e053-3a05fe0a3a96 67
An Assurance Framework and Process for Hybrid Systems, file 170eea38-5210-471b-b4eb-7ebad22c84a4 63
Security Certification Scheme for Content-centric Networks, file dfa8b9a8-fb71-748b-e053-3a05fe0a3a96 55
An assurance process for Big Data trustworthiness, file 196f0099-0c1f-4703-8b9e-cc59776b1340 44
A Configuration-Independent Score-Based Benchmark for Distributed Databases, file dfa8b9a6-59dd-748b-e053-3a05fe0a3a96 41
On the Robustness of Random Forest Against Untargeted Data Poisoning: An Ensemble-Based Approach, file a68d3f41-53c6-498c-9b8d-2d2662cd0eb6 37
Non-Functional Certification of Modern Distributed Systems: A Research Manifesto, file d4e3cd06-186f-4f7e-9a25-17a1c1a346a4 32
Container-level security certification of services, file dfa8b990-5aab-748b-e053-3a05fe0a3a96 29
Anonymous end-to-end communications in adversarial mobile clouds, file dfa8b9a6-5cd7-748b-e053-3a05fe0a3a96 28
A certification-aware service-oriented architecture, file dfa8b990-c342-748b-e053-3a05fe0a3a96 25
Multi-Dimensional Certification of Modern Distributed Systems, file 3d9eb82b-fedc-43f3-8974-582639c41052 23
Explainable Data Poison Attacks on Human Emotion Evaluation Systems Based on EEG Signals, file a7cd752b-9473-4f86-bb61-ea5715be4136 22
A low-cost security certification scheme for evolving services, file dfa8b990-58da-748b-e053-3a05fe0a3a96 18
Scalability patterns for Platform-as-a-Service, file dfa8b990-5437-748b-e053-3a05fe0a3a96 11
Lightweight Behavior-Based Malware Detection, file 065e8af8-58d2-42e6-a8bf-09c18e220cf9 10
Zero-knowledge evaluation of service performance based on simulation, file dfa8b991-13f9-748b-e053-3a05fe0a3a96 10
Moon Cloud: A Cloud Platform for ICT Security Governance, file dfa8b99d-1ecf-748b-e053-3a05fe0a3a96 9
Security certification-aware service discovery and selection, file dfa8b990-94bc-748b-e053-3a05fe0a3a96 8
Modeling time, probability, and configuration constraints for continuous cloud service certification, file dfa8b999-a03b-748b-e053-3a05fe0a3a96 7
Lightweight Behavior-Based Malware Detection, file 1cdce08a-20f5-4b8b-b204-6640c949f386 6
A model-based approach to reliability certification of services, file dfa8b990-176e-748b-e053-3a05fe0a3a96 6
Anonymous end-to-end communications in adversarial mobile clouds, file dfa8b996-997d-748b-e053-3a05fe0a3a96 6
A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis, file 10fb056b-879b-4a18-9581-dbc93a864e1a 5
STS2Java : an Eclipse plugin for early assessment of service performance based on simulation, file dfa8b990-d232-748b-e053-3a05fe0a3a96 5
Towards Transparent and Trustworthy Cloud, file dfa8b999-8594-748b-e053-3a05fe0a3a96 5
A Case for IoT Security Assurance, file dfa8b99a-9e94-748b-e053-3a05fe0a3a96 5
Location Information (Privacy of), file dfa8b9aa-53b8-748b-e053-3a05fe0a3a96 5
Privacy-Aware Languages, file dfa8b9aa-555e-748b-e053-3a05fe0a3a96 5
Bridging the Gap between Certification and Software Development, file fc8c05a1-d28f-48b7-bae0-515d6d655eff 5
Rethinking Certification for Trustworthy Machine Learning-Based Applications, file 8cd45cf0-8c00-4ddf-b1cc-5e0b76f7b8ca 4
Preserving smartphone users' anonymity in Cloudy Days, file dfa8b990-dd1b-748b-e053-3a05fe0a3a96 4
Expressive and deployable access control in open Web service applications, file dfa8b993-845c-748b-e053-3a05fe0a3a96 4
An obfuscation-based approach for protecting location privacy, file dfa8b993-d41b-748b-e053-3a05fe0a3a96 4
A Model-Driven Methodology for Big Data Analytics-as-a-Service, file dfa8b99a-aa45-748b-e053-3a05fe0a3a96 4
Moon Cloud: A Cloud Platform for ICT Security Governance, file dfa8b9a7-cf46-748b-e053-3a05fe0a3a96 4
XML-Based Access Control Languages, file dfa8b9a9-f410-748b-e053-3a05fe0a3a96 4
Towards an Assurance Framework for Edge and IoT Systems, file dfa8b9aa-49cd-748b-e053-3a05fe0a3a96 4
A security certification scheme for Information-Centric Networks, file e8bddf12-f44e-49b5-894b-146f613304a2 4
Continuous Certification of Non-functional Properties Across System Changes, file 8ea90959-4f00-475e-a910-f4b2b3024f9c 3
A 5G-IoT enabled Big Data infrastructure for data-driven agronomy, file b2672e3f-db6e-41ea-b18d-f6f0b0cf6334 3
A Java-based certification framework for service compositions, file dfa8b990-ca87-748b-e053-3a05fe0a3a96 3
Security certification of composite services: a test-based approach, file dfa8b990-e66f-748b-e053-3a05fe0a3a96 3
Early assessment of service performance based on simulation, file dfa8b990-ea33-748b-e053-3a05fe0a3a96 3
An anonymous end-to-end communication protocol for mobile cloud environments, file dfa8b993-6b87-748b-e053-3a05fe0a3a96 3
A hybrid representation model for service contracts, file dfa8b993-9275-748b-e053-3a05fe0a3a96 3
Map-based location and tracking in multipath outdoor mobile networks, file dfa8b993-d22e-748b-e053-3a05fe0a3a96 3
Welcome message from the IWSAC Workshop Chairs, file dfa8b995-874c-748b-e053-3a05fe0a3a96 3
Trustworthy cloud certification: a model-based approach, file dfa8b996-dee7-748b-e053-3a05fe0a3a96 3
A cost-effective certification-based service composition for the cloud, file dfa8b996-fbdc-748b-e053-3a05fe0a3a96 3
Big data assurance evaluation: An sla-based approach, file dfa8b99c-22b0-748b-e053-3a05fe0a3a96 3
Certified Machine-Learning Models, file dfa8b9a0-f349-748b-e053-3a05fe0a3a96 3
Lightweight Behavior-Based Malware Detection, file ea13014e-d146-4c62-8f2b-79ade508362c 3
A Security Review in the UAVNet Era: Threats, Countermeasures, and Gap Analysis, file 20f4e59f-2831-46c1-8fa8-cad17188d52c 2
Big Data Assurance: An Approach Based on Service-Level Agreements, file 2e3a4faf-3e3f-4180-8400-00076c987a0e 2
Rethinking Certification for Trustworthy Machine Learning-Based Applications, file 395422d5-5616-4050-9539-fda427e091f3 2
Continuous Certification of Non-functional Properties Across System Changes, file 40872862-cf7b-437f-a941-cf655c2f35a5 2
null, file 7df93d97-538a-4df6-9355-7625561e0416 2
Rethinking Certification for Trustworthy Machine Learning-Based Applications, file 81ae4910-48ca-4040-8530-a87a4524b15d 2
MUSA: A platform for data-intensive services in Edge-Cloud Continuum, file 8c4ebe9e-f0df-4998-ad11-0cc3c90ba9b0 2
Big Data Assurance: An Approach Based on Service-Level Agreements, file c09eb303-24e6-41a4-9c8f-2b2e9ca3e817 2
Bridging the Gap between Certification and Software Development, file c0f5879e-9c63-4cd8-b8dc-16a090bc6d25 2
null, file dc861dd6-f0a5-4e71-a3a7-2912bf6338fe 2
On the management of cloud non-functional properties : the cloud transparency toolkit, file dfa8b991-28ed-748b-e053-3a05fe0a3a96 2
Message from IWSAC workshop chairs: Workshop on security assurance in the cloud, file dfa8b993-8c36-748b-e053-3a05fe0a3a96 2
Totale 17.784
Categoria #
all - tutte 26.795
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 26.795


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019326 0 0 0 0 0 0 0 0 0 0 182 144
2019/20201.622 142 85 131 177 180 115 119 127 190 143 114 99
2020/20212.195 115 114 130 160 191 132 233 146 213 340 243 178
2021/20222.845 195 207 166 378 333 183 215 199 206 224 312 227
2022/20232.489 143 137 290 247 210 243 225 184 183 193 252 182
2023/20242.782 177 144 190 201 479 195 424 289 179 322 182 0
Totale 17.832