Berlato, Stefano
 Distribuzione geografica
Continente #
NA - Nord America 175
EU - Europa 143
AS - Asia 100
AF - Africa 5
SA - Sud America 2
OC - Oceania 1
Totale 426
Nazione #
US - Stati Uniti d'America 175
IT - Italia 69
CN - Cina 39
DE - Germania 33
SG - Singapore 19
HK - Hong Kong 17
IE - Irlanda 16
IN - India 9
RU - Federazione Russa 8
FI - Finlandia 7
JP - Giappone 6
SE - Svezia 4
VN - Vietnam 4
EG - Egitto 3
TR - Turchia 3
UA - Ucraina 3
CL - Cile 2
FR - Francia 2
KE - Kenya 2
NP - Nepal 2
IR - Iran 1
NZ - Nuova Zelanda 1
RO - Romania 1
Totale 426
Città #
Chandler 45
Trento 33
Boardman 23
Dublin 16
Hong Kong 16
Singapore 16
Beijing 12
Jacksonville 9
Kronberg 9
Shanghai 8
Helsinki 7
Dongguan 6
New York 6
Tokyo 6
Wilmington 6
Rome 5
Borgo Valsugana 3
Cairo 3
Dong Ket 3
Mumbai 3
Adana 2
Ashburn 2
Badia Calavena 2
Brooklyn 2
Des Moines 2
Ferrara 2
Guangzhou 2
Gunzenhausen 2
Hanover 2
Kathmandu 2
Long Beach 2
Marietta 2
Modena 2
Mogliano Veneto 2
Nairobi 2
Nanjing 2
Padova 2
San Martino In Pensilis 2
Santiago 2
Vicenza 2
Xi'an 2
Aachen 1
Arezzo 1
Auckland 1
Falkenstein 1
Hanoi 1
Inglewood 1
Karlsruhe 1
Kowloon City 1
Limena 1
Maserà di Padova 1
Miami 1
Nuremberg 1
Portland 1
Pune 1
Redwood City 1
San Antonio 1
Santa Clara 1
Secaucus 1
Shenzhen 1
Tappahannock 1
Verona 1
Washington 1
Totale 299
Nome #
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 66
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps 60
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 50
Blockchain Based RAN Data Sharing 42
A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications 38
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 37
Exploring Architectures for Cryptographic Access Control Enforcement in the Cloud for Fun and Optimization 36
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 36
Security Considerations on 5G-Enabled Back-Situation Awareness for CCAM 33
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies 22
Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM 17
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging 13
OpenABE Bindings for Kotlin 10
Cryptographic Enforcement of Attribute-based Access Control Policies 6
Totale 466
Categoria #
all - tutte 3.822
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 3.822


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202020 0 0 0 0 0 0 0 0 11 3 6 0
2020/202132 3 0 1 13 4 0 3 0 1 3 0 4
2021/202273 2 3 4 7 11 12 4 9 5 0 5 11
2022/2023135 16 17 2 16 3 9 1 22 26 11 6 6
2023/2024171 11 1 6 5 3 14 12 14 8 34 2 61
2024/202535 28 7 0 0 0 0 0 0 0 0 0 0
Totale 466