Berlato, Stefano
 Distribuzione geografica
Continente #
NA - Nord America 229
EU - Europa 182
AS - Asia 170
AF - Africa 6
SA - Sud America 2
OC - Oceania 1
Totale 590
Nazione #
US - Stati Uniti d'America 225
IT - Italia 93
SG - Singapore 55
CN - Cina 47
DE - Germania 39
HK - Hong Kong 36
IE - Irlanda 16
IN - India 10
FI - Finlandia 8
RU - Federazione Russa 8
JP - Giappone 6
CA - Canada 4
SE - Svezia 4
VN - Vietnam 4
BD - Bangladesh 3
EG - Egitto 3
TR - Turchia 3
UA - Ucraina 3
AT - Austria 2
CL - Cile 2
FR - Francia 2
HR - Croazia 2
KE - Kenya 2
NP - Nepal 2
BE - Belgio 1
CH - Svizzera 1
GB - Regno Unito 1
GR - Grecia 1
IR - Iran 1
JO - Giordania 1
KZ - Kazakistan 1
MA - Marocco 1
MY - Malesia 1
NZ - Nuova Zelanda 1
RO - Romania 1
Totale 590
Città #
Singapore 50
Trento 46
Chandler 45
Hong Kong 35
Boardman 25
Dublin 16
Beijing 12
Jacksonville 9
Kronberg 9
New York 9
Helsinki 8
Shanghai 8
Dongguan 6
Santa Clara 6
Tokyo 6
Wilmington 6
Rome 5
Ashburn 3
Borgo Valsugana 3
Cadoneghe 3
Cairo 3
Dong Ket 3
Los Angeles 3
Maserà di Padova 3
Mumbai 3
Shenzhen 3
Verona 3
Adana 2
Badia Calavena 2
Brooklyn 2
Des Moines 2
Ferrara 2
Guangzhou 2
Gunzenhausen 2
Hanover 2
Kathmandu 2
Long Beach 2
Marietta 2
Modena 2
Mogliano Veneto 2
Montreal 2
Munich 2
Nairobi 2
Nanjing 2
Ottawa 2
Padova 2
San Martino In Pensilis 2
Santiago 2
Vicenza 2
Xi'an 2
Zagreb 2
Aachen 1
Almaty 1
Amman 1
Arezzo 1
Athens 1
Auckland 1
Brussels 1
Falkenstein 1
Frankfurt am Main 1
Hanoi 1
Inglewood 1
Karlsruhe 1
Kowloon City 1
Kuala Lumpur 1
Limena 1
Miami 1
Newark 1
Nuremberg 1
Portland 1
Pune 1
Rabat 1
Redwood City 1
Richmond 1
San Antonio 1
Secaucus 1
Tappahannock 1
Vienna 1
Washington 1
Zurich 1
Totale 408
Nome #
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 75
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps 68
A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications 56
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 54
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 49
Blockchain Based RAN Data Sharing 48
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization 43
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 43
Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM 38
OpenABE Bindings for Kotlin 30
Work-in-Progress: A Sidecar Proxy for Usable and Performance-Adaptable End-to-End Protection of Communications in Cloud Native Applications 30
Cryptographic Enforcement of Attribute-based Access Control Policies 29
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies 26
Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM 26
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging 18
Totale 633
Categoria #
all - tutte 4.705
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 4.705


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202020 0 0 0 0 0 0 0 0 11 3 6 0
2020/202132 3 0 1 13 4 0 3 0 1 3 0 4
2021/202273 2 3 4 7 11 12 4 9 5 0 5 11
2022/2023135 16 17 2 16 3 9 1 22 26 11 6 6
2023/2024171 11 1 6 5 3 14 12 14 8 34 2 61
2024/2025202 28 33 87 21 17 16 0 0 0 0 0 0
Totale 633