PECCHIA, ANTONIO
 Distribuzione geografica
Continente #
NA - Nord America 999
EU - Europa 579
AS - Asia 303
OC - Oceania 5
AF - Africa 3
SA - Sud America 2
Continente sconosciuto - Info sul continente non disponibili 1
Totale 1.892
Nazione #
US - Stati Uniti d'America 969
IT - Italia 369
SG - Singapore 161
CN - Cina 114
IE - Irlanda 49
DE - Germania 36
FI - Finlandia 36
CA - Canada 30
SE - Svezia 20
AT - Austria 15
GB - Regno Unito 12
IN - India 9
RU - Federazione Russa 8
TR - Turchia 8
NL - Olanda 7
ES - Italia 6
AU - Australia 5
FR - Francia 5
LV - Lettonia 5
UA - Ucraina 4
JP - Giappone 3
KR - Corea 3
PL - Polonia 3
BE - Belgio 2
BR - Brasile 2
CI - Costa d'Avorio 2
IL - Israele 2
RO - Romania 2
DZ - Algeria 1
EU - Europa 1
HK - Hong Kong 1
ID - Indonesia 1
IR - Iran 1
Totale 1.892
Città #
Chandler 167
Singapore 138
Millbury 59
Napoli 52
Santa Clara 41
Princeton 40
Nanjing 33
Naples 31
Ottawa 27
Boston 25
Des Moines 23
Wilmington 21
Rome 20
Ashburn 18
Beijing 16
Boardman 16
Lawrence 15
Jacksonville 14
Vienna 14
Milan 13
Hebei 11
Shenyang 11
Nanchang 9
Cava De' Tirreni 7
Giugliano in Campania 7
Reading 7
Tianjin 7
Cagliari 6
Changsha 6
Dallas 6
Indiana 6
Cisterna 5
Kronberg 5
Redwood City 5
Scafati 5
Seattle 5
Amsterdam 4
Castellammare Di Stabia 4
Houston 4
Kunming 4
Piano di Sorrento 4
Salerno 4
Acerra 3
Ann Arbor 3
Dearborn 3
Dublin 3
Ercolano 3
Fairfield 3
Frattaminore 3
Guangzhou 3
Istanbul 3
Livorno 3
Meta 3
Palermo 3
Roseto Capo Spulico 3
San Francisco 3
Seoul 3
Seregno 3
Toronto 3
Toulouse 3
Västerås 3
Woodbridge 3
Zhengzhou 3
Arienzo 2
Aversa 2
Cava 2
Chengdu 2
Gent 2
Gragnano 2
Horia 2
Jiaxing 2
Lamézia 2
Los Angeles 2
Lucera 2
Marsala 2
Melbourne 2
Munich 2
New Delhi 2
Norwalk 2
Pignataro Maggiore 2
Rio de Janeiro 2
Shimshit 2
Siano 2
Suri 2
Tokyo 2
Torino 2
Verona 2
Villaricca 2
Alfter 1
Antea 1
Ariano Irpino 1
Baltringen 1
Battipaglia 1
Berlin 1
Binasco 1
Borgo San Lorenzo 1
Bowie 1
Cambridge 1
Casalnuovo Di Napoli 1
Castello 1
Totale 1.040
Nome #
A framework for on-line timing error detection in software systems 75
Challenges and Directions in Security Information and Event Management (SIEM) 75
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks 64
Microservices Monitoring with Event Logs and Black Box Execution Tracing 61
Multiobjective Testing Resource Allocation under Uncertainty 60
Debugging-workflow-aware software reliability growth analysis 58
Criticality-Driven Component Integration in Complex Software Systems 55
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 54
A Method to Support Fault Tolerance Design in Service Oriented Computing Systems 53
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study 53
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems 51
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud 50
An experiment in memory leak analysis with a mission-critical middleware for Air Traffic Control 49
A Logging Approach for Effective Dependability Evaluation of Complex Systems 49
Assessing and Improving the Effectiveness of Logs for the Analysis of Software Faults 47
Advancing monitoring in microservices systems 47
A Preliminary Fault Injection Framework for Evaluating Multicore Systems 44
MINIMINDS – Middleware per l’Interoperabilità e l’Integrazione di Sistemi critici per tempo e affidabilità 44
SVEVIA - Innovative methods and techniques for Software VErification and ValIdAtion of near-realtime complex systems 44
Memory Leak Analysis of Mission-Critical Middleware 43
A failure analysis of data distribution middleware in a mission-critical system for air traffic control 42
Detection of Software Failures through Event Logs: an Experimental Study 40
An empirical analysis of error propagation in critical software systems 40
Empirical Analysis and Validation of Security Alerts Filtering Techniques 38
An Approach for Assessing Logs by Software Fault Injection 36
Contextual filtering and prioritization of computer application logs for security situational awareness 35
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics 34
Architecture-Based Criticality Assessment of Software Systems 33
Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems 31
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 31
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets 30
Discovering hidden errors from application log traces with process mining 30
On the impact of debugging on software reliability growth analysis: a case study 28
Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 28
On the injection of hardware faults in virtualized multicore systems 27
Event logging in an industrial development process: Practices and reengineering challenges 26
Microservices Monitoring with Event Logs and Black Box Execution Tracing 26
On the Use of Event Logs for the Analysis of System Failures 25
Entropy-Based Security Analytics: Measurements from a Critical Information System 25
Event Logs for the Analysis of Software Failures: A Rule-Based Approach 23
Leveraging Fault Injection Techniques in Critical Industrial Applications 23
Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications 23
Filtering Security Alerts for the Analysis of a Production SaaS Cloud 23
Towards Secure Monitoring and Control Systems: Diversify! 22
Industry Practices and Event Logging: Assessment of a Critical Software Development Process 22
Message from the RSDA 2014 workshop co-chairs 22
Measuring Resiliency through Field Data: Techniques, Tools and Challenges 21
Towards Cognitive Security Defense from Data 19
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination 19
Enabling Effective Dependability Evaluation of Complex Systems via a Rule-Based Logging Framework 18
Towards a Framework for Field Data Production and Management 16
Discovering process models for the analysis of application failures under uncertainty of event logs 16
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach 16
Improving FFDA of Web Servers through a Rule-Based Logging Approach 14
The third international workshop on reliability and security data analysis (RSDA 2016) 13
Totale 1.991
Categoria #
all - tutte 8.253
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 8.253


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020142 0 0 0 0 24 18 14 3 7 8 45 23
2020/2021102 1 1 7 8 15 12 4 10 9 19 15 1
2021/2022369 4 4 1 6 10 17 4 22 54 17 103 127
2022/2023403 62 27 23 25 51 50 15 39 80 5 11 15
2023/2024222 9 44 30 12 12 9 4 35 2 5 42 18
2024/2025268 73 141 13 24 17 0 0 0 0 0 0 0
Totale 1.991