dos Santos, Daniel Ricardo
 Distribuzione geografica
Continente #
NA - Nord America 588
EU - Europa 256
AS - Asia 76
AF - Africa 2
Continente sconosciuto - Info sul continente non disponibili 1
SA - Sud America 1
Totale 924
Nazione #
US - Stati Uniti d'America 562
DE - Germania 61
UA - Ucraina 52
HK - Hong Kong 30
FI - Finlandia 28
CA - Canada 26
IT - Italia 24
SE - Svezia 20
RU - Federazione Russa 19
VN - Vietnam 17
CN - Cina 15
GB - Regno Unito 14
IE - Irlanda 14
BE - Belgio 13
IN - India 12
FR - Francia 4
NL - Olanda 3
EG - Egitto 2
ES - Italia 2
BR - Brasile 1
CH - Svizzera 1
EE - Estonia 1
EU - Europa 1
IL - Israele 1
JP - Giappone 1
Totale 924
Città #
Chandler 168
Jacksonville 120
Ann Arbor 38
Hong Kong 30
Wilmington 29
Ottawa 25
Dong Ket 17
Kronberg 17
Helsinki 15
Dublin 14
Trento 14
Brussels 13
Dearborn 13
Ashburn 12
Boardman 10
Beijing 9
Los Angeles 9
Houston 8
Woodbridge 6
Campogalliano 5
Seattle 5
Phoenix 4
Pune 4
Brooklyn 3
Fremont 3
Mountain View 3
Redwood City 3
Saint Petersburg 3
Verona 3
Guangzhou 2
Madrid 2
New York 2
Portland 2
Auburn Hills 1
Birmensdorf 1
Chengdu 1
Fuzhou 1
Gunzenhausen 1
Kista 1
Nanjing 1
Neumarkt 1
North Bergen 1
Norwalk 1
Rome 1
San Jose 1
Tartu 1
Wuhan 1
Totale 625
Nome #
Risk-based Dynamic Access Control for a Highly Scalable Cloud Federation 75
A Review of PACS on Cloud for Archiving Secure Medical Images 72
Challenges of Operationalizing PACS on Cloud Over Wireless Networks 69
Automatically finding execution scenarios to deploy security-sensitive workflows 68
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 65
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 63
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 58
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 56
TESTREX: a Testbed for Repeatable Exploits 54
Modularity for Security-Sensitive Workflows 54
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 54
From System Specification to Anomaly Detection (and back) 54
A cyclical evaluation model of information security maturity 53
A dynamic risk-based access control architecture for cloud computing 48
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios 48
A Validation Model of Data Input for Web Services 46
An Architecture for Risk Analysis in Cloud 41
Totale 978
Categoria #
all - tutte 5.002
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 5.002


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20198 0 0 0 0 0 0 0 0 0 0 5 3
2019/2020170 17 17 4 0 22 11 20 1 22 7 40 9
2020/2021177 21 1 20 5 24 7 43 0 4 23 3 26
2021/202272 1 0 3 6 0 2 2 15 5 2 10 26
2022/2023301 17 37 4 59 8 37 2 43 68 14 12 0
2023/2024114 10 6 14 8 6 6 4 17 2 41 0 0
Totale 978