DE BENEDICTIS, ALESSANDRA
 Distribuzione geografica
Continente #
NA - Nord America 854
EU - Europa 558
AS - Asia 293
SA - Sud America 9
AF - Africa 6
OC - Oceania 1
Totale 1.721
Nazione #
US - Stati Uniti d'America 839
IT - Italia 388
SG - Singapore 218
CN - Cina 55
FI - Finlandia 45
DE - Germania 29
IE - Irlanda 23
CA - Canada 15
GB - Regno Unito 14
RU - Federazione Russa 14
PK - Pakistan 9
FR - Francia 7
SE - Svezia 7
BR - Brasile 6
CZ - Repubblica Ceca 5
AT - Austria 4
CI - Costa d'Avorio 4
GR - Grecia 4
JP - Giappone 4
RO - Romania 4
ES - Italia 3
IN - India 3
EC - Ecuador 2
HK - Hong Kong 2
NG - Nigeria 2
NL - Olanda 2
PL - Polonia 2
PT - Portogallo 2
AU - Australia 1
BE - Belgio 1
CH - Svizzera 1
CO - Colombia 1
EE - Estonia 1
MY - Malesia 1
NO - Norvegia 1
TW - Taiwan 1
UA - Ucraina 1
Totale 1.721
Città #
Santa Clara 218
Singapore 185
Chandler 80
Naples 62
Millbury 57
Napoli 45
Des Moines 43
Boston 37
Lawrence 34
Princeton 25
Helsinki 22
Nanjing 20
Ashburn 14
Ottawa 13
Redwood City 11
Rome 11
Falkenstein 10
Wilmington 9
Alvignano 7
Beijing 7
Salerno 7
Moscow 6
Quattro Castella 6
Arezzo 5
Fairfield 5
Hradec Králové 5
Islamabad 5
Nanchang 5
Athens 4
Boardman 4
Hebei 4
Jiaxing 4
Lappeenranta 4
Modena 4
Pozzuoli 4
San Donato Milanese 4
Siena 4
Tianjin 4
Torre Del Greco 4
Bolzano 3
Karachi 3
Madrid 3
Milan 3
Prato 3
Strasbourg 3
Trento 3
Watford 3
Afragola 2
Andria 2
Aquila 2
Brescia 2
Changsha 2
Chieti 2
Fremont 2
Guayaquil 2
Hong Kong 2
Lagos 2
Lioni 2
Lisbon 2
London 2
Marcianise 2
Marigliano 2
Melito Di Napoli 2
New York 2
Norwalk 2
Nuremberg 2
Oita 2
Palermo 2
Palmeira dos Índios 2
Parete 2
Poggiomarino 2
Sant'Antimo 2
Santa Maria a Vico 2
Taubaté 2
Torino 2
Vienna 2
Vigliano Biellese 2
Wang 2
Wiesbaden 2
Woodbridge 2
Zhengzhou 2
Adelaide 1
Altavilla Irpina 1
Amsterdam 1
Bari 1
Billericay 1
Bogotá 1
Borgo San Lorenzo 1
Calvizzano 1
Caserta 1
Casoria 1
Cassino 1
Catanzaro 1
Cedar Knolls 1
Cologne 1
Constanta 1
Council Bluffs 1
Dalmine 1
Dublin 1
Ferrandina 1
Totale 1.109
Nome #
A methodology for automated penetration testing of cloud applications 56
A cloud secdevops methodology: From design to testing 53
An automatic tool for benchmark testing of cloud applications 46
A Secure Architecture for Re-Taskable Sensing Systems 44
Security-aware Deployment Optimization of Cloud-Edge systems in Industrial IoT 44
Analysis and comparison of security protocols in wireless sensor networks 43
A First Step towards an ISO-Based Information Security Domain Ontology 42
On the adoption of Physically Unclonable Functions to secure IIoT devices 41
Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services 40
A model-Based evaluation methodology for smart energy systems 38
Automated risk analysis for IOT systems 38
Automatically Enforcing Security SLAs in the Cloud 36
DoS Protection in the Cloud through the SPECS Services 35
A PUF-based mutual authentication scheme for Cloud-Edges IoT systems 34
Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security 33
Cloud security: From per-provider to per-service security SLAs 33
Designing Secure and Resilient Cyber-Physical Systems: a Model-based Moving Target Defense Approach 32
A security metric catalogue for cloud applications 32
Model-based deployment of secure multi-cloud applications 32
Securing a Tiered Re-Taskable Sensing System 31
Securing freight trains for hazardous material transportation: a WSN-based monitoring system 30
A PUF-based hardware mutual authentication protocol 29
A multi-layer moving target defense approach for protecting resource-constrained distributed devices 29
Mobile traffic analysis exploiting a cloud infrastructure and hardware accelerators 28
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach 28
MUSA deployer: Deployment of multi-cloud applications 27
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services 27
Monitoring Data Security in the Cloud: A Security SLA-Based Approach 27
A moving target defense approach for protecting resource-constrained distributed devices 26
On the adoption of security SLAs in the cloud 26
Towards model-based security assessment of cloud applications 26
A framework for cloud-aware development of bag-of-tasks scientific applications 26
Providing mobile traffic analysis as-a-Service: Design of a service-based infrastructure to offer high-accuracy traffic classifiers based on hardware accelerators 26
A Cyber Digital Twin Framework to Support Cyber-Physical Systems Security 25
Digital Twins in Healthcare: an architectural proposal and its application in a social distancing case study 25
Preliminary design of a platform-as-a-service to provide security in cloud 25
Per-service security sla: A new model for security management in clouds 25
A Security and Privacy Validation Methodology for e-Health Systems 25
Digital Twins for Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture and Proof-of-Concept 24
SLA-based secure cloud application development 24
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications 24
PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems 23
A security monitoring system for internet of things 22
Towards AI-assisted digital twins for smart railways: preliminary guideline and reference architecture 21
SeNsiM-SEC: Secure sensor networks integration to monitor rail freight transport 21
Toward automated threat modeling of edge computing systems 21
SeNsIM-SEC: security in heterogeneous sensor networks 19
Security monitoring in the cloud: An SLA-based approach 19
A probabilistic framework for localization of attackers in MANETs 19
Toward the automation of threat modeling and risk assessment in IoT systems 19
A moving target defense mechanism for MANETs based on identity virtualization 19
Preface 19
SLA-Based Secure Cloud Application Development: The SPECS Framework 18
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal 18
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems 18
Secure software development and testing: A model-based methodology 17
A Probabilistic Framework for Distributed Localization of Attackers in MANETs 17
null 17
Per-service security SLAs for cloud security management: Model and implementation 17
Towards automated penetration testing for cloud applications 16
An SLA-based brokering platform to provide sensor networks as-a-service 15
An SLA-based approach to manage sensor networks as-a-service 15
A proposal of a cloud-oriented security and performance simulator provided as-a-service 15
Security-by-design in multi-cloud applications: An optimization approach 15
SecLA-Based Negotiation and Brokering of Cloud Resources 15
A security SLA-driven moving target defense framework to secure cloud applications 14
REST-based SLA management for cloud applications 14
A probabilistic framework for jammer identification in MANETs 12
ISM-AC: an immune security model based on alert correlation and software-defined networking 12
SLAs for cloud applications: Agreement protocol and REST-based implementation 10
Security and Privacy Issues in Mobility-as-a-Service (MaaS): A Systematic Review 3
Enabling Technologies: Infrastructure for Collaborative Enterprises Editorial for WETICE 2019 Conference 3
Totale 1.838
Categoria #
all - tutte 9.277
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 9.277


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202072 0 0 0 0 0 31 8 2 3 6 16 6
2020/2021151 14 4 9 21 4 10 19 21 16 20 9 4
2021/2022336 7 4 4 17 4 1 16 17 37 11 74 144
2022/2023276 61 4 7 5 43 29 7 32 60 7 13 8
2023/2024259 12 36 23 15 7 11 17 16 18 8 53 43
2024/2025539 108 155 6 15 90 165 0 0 0 0 0 0
Totale 1.838