LUCCIO, Flaminia
 Distribuzione geografica
Continente #
EU - Europa 575
AS - Asia 557
NA - Nord America 439
AF - Africa 62
SA - Sud America 16
OC - Oceania 9
Totale 1.658
Nazione #
US - Stati Uniti d'America 410
IT - Italia 291
PH - Filippine 128
IN - India 78
SA - Arabia Saudita 64
CN - Cina 62
DE - Germania 60
GB - Regno Unito 47
FR - Francia 32
MY - Malesia 30
ID - Indonesia 25
RU - Federazione Russa 24
CA - Canada 18
NL - Olanda 18
TR - Turchia 18
HK - Hong Kong 17
UA - Ucraina 17
KR - Corea 15
KZ - Kazakistan 15
TH - Thailandia 14
AZ - Azerbaigian 13
DZ - Algeria 13
KE - Kenya 13
NG - Nigeria 13
VN - Vietnam 12
PK - Pakistan 11
SI - Slovenia 11
AU - Australia 9
IR - Iran 9
MX - Messico 9
CZ - Repubblica Ceca 8
EC - Ecuador 8
GH - Ghana 8
GR - Grecia 8
FI - Finlandia 7
ES - Italia 6
JP - Giappone 6
SE - Svezia 6
TW - Taiwan 6
NP - Nepal 5
PL - Polonia 5
PT - Portogallo 5
CH - Svizzera 4
LT - Lituania 4
SG - Singapore 4
AT - Austria 3
BR - Brasile 3
HU - Ungheria 3
IE - Irlanda 3
IL - Israele 3
IQ - Iraq 3
MO - Macao, regione amministrativa speciale della Cina 3
NO - Norvegia 3
RO - Romania 3
ZA - Sudafrica 3
AR - Argentina 2
BF - Burkina Faso 2
BT - Bhutan 2
CM - Camerun 2
CO - Colombia 2
DK - Danimarca 2
JO - Giordania 2
LK - Sri Lanka 2
MN - Mongolia 2
OM - Oman 2
PA - Panama 2
PS - Palestinian Territory 2
RS - Serbia 2
TG - Togo 2
TN - Tunisia 2
AE - Emirati Arabi Uniti 1
BD - Bangladesh 1
BE - Belgio 1
CD - Congo 1
EG - Egitto 1
HR - Croazia 1
KW - Kuwait 1
LU - Lussemburgo 1
MW - Malawi 1
PE - Perù 1
TZ - Tanzania 1
UZ - Uzbekistan 1
Totale 1.658
Città #
Ashburn 59
Woodbridge 57
Venezia 53
Boardman 37
Riyadh 28
Venice 21
Milan 20
Parma 18
Chennai 17
Kuala Lumpur 16
Almaty 15
Everett 13
Jakarta 13
Quezon City 13
Al Qatif 11
Baku 11
Bangkok 11
Gwangjin-gu 11
Shanghai 11
Newcastle upon Tyne 10
Santa Cruz 10
Hebei 9
Jeddah 9
Somma Vesuviana 9
Nairobi 8
Villeurbanne 8
Dammam 7
Delhi 7
London 7
Semic 7
Accra 6
Ankara 6
Berlin 6
Cambridge 6
Davao City 6
Flensburg 6
Kolkata 6
Marikina City 6
Mumbai 6
Petaling Jaya 6
Québec 6
Rome 6
Suri 6
Bengaluru 5
Biskra 5
Buffalo 5
Cagayan de Oro 5
Cebu City 5
Central 5
Eastern Province 5
Frankfurt am Main 5
General Trias 5
Kathmandu 5
Lamongan 5
Madrid 5
Mountain View 5
Toronto 5
University Park 5
Amsterdam 4
Beijing 4
Caloocan City 4
Carmona 4
Cheremshan 4
Corte Franca 4
Council Bluffs 4
Dong Ket 4
Edirne 4
Fremont 4
Guayaquil 4
Hangzhou 4
Hanoi 4
Helsinki 4
Islamabad 4
Istanbul 4
Klaipėda 4
Kollam 4
Pittsburgh 4
Seattle 4
Seoul 4
Shah Alam 4
Thierhaupten 4
Abuja 3
Ambato 3
Angeles City 3
Ann Arbor 3
Bacolod City 3
Bacoor 3
Batangas 3
Chiang Mai 3
Chicago 3
Cincinnati 3
Des Moines 3
Ho Chi Minh City 3
Khobar 3
Lagos 3
Liberty 3
Lucknow 3
Manila 3
Perth 3
Pune 3
Totale 828
Nome #
Usable security for QR code, file e4239dde-a7bc-7180-e053-3705fe0a3322 691
Usable Cryptographic QR Codes, file e4239ddd-fcde-7180-e053-3705fe0a3322 565
Type-Based Analysis of Generic Key Management APIs, file e4239dde-6f55-7180-e053-3705fe0a3322 105
Localizing Security for Distributed Firewalls, file e4239ddb-da31-7180-e053-3705fe0a3322 42
Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors, file e4239dde-01f1-7180-e053-3705fe0a3322 29
Gathering of robots in a ring with mobile faults, file e4239ddd-ffd4-7180-e053-3705fe0a3322 26
Localizing Firewall Security Policies, file e4239dde-026a-7180-e053-3705fe0a3322 22
Mobile Agents Rendezvous in spite of a Malicious Agent., file e4239ddd-ff70-7180-e053-3705fe0a3322 14
FWS: Analyzing, maintaining and transcompiling firewalls, file e4239dde-0ff3-7180-e053-3705fe0a3322 12
Guessing Bank PINs by Winning a Mastermind Game, file e4239ddb-2b76-7180-e053-3705fe0a3322 8
Secure Key Management Policies in Strand Spaces, file e4239dde-81a7-7180-e053-3705fe0a3322 8
The Revenge of Password Crackers: Automated Training of Password Cracking Tools, file cb642f2b-b7e5-40c2-9511-d6f2832b2dbf 7
Modelling Volo, an Augmentative and Alternative Communication application, file e4239ddb-aa4a-7180-e053-3705fe0a3322 7
Usable security for QR code, file e4239ddd-f694-7180-e053-3705fe0a3322 7
Don't Get Stranded: Secure and Dynamic Key Management Policies with Strand Spaces, file 5c993aea-daaa-46d4-b643-29bad1331942 6
Type-based Analysis of Key Management in PKCS#11 cryptographic devices, file e4239ddb-42e6-7180-e053-3705fe0a3322 6
Mignis: A semantic based tool for firewall configuration, file e4239ddb-d546-7180-e053-3705fe0a3322 6
Gathering of robots in a ring with mobile faults, file e4239ddc-0849-7180-e053-3705fe0a3322 5
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study, file e4239ddc-66ed-7180-e053-3705fe0a3322 5
Design and Implementation of Fast and Cost-Effective FPGA-Based Fuzzy Rainbow Tradeoffs, file 7d877085-ab6e-499c-befb-9fdd24e3c6e5 4
Automated Learning and Verification of Embedded Security Architectures, file b0a799bb-7bdb-4920-8551-f9522dbcc06a 4
A Recipe for Cost-Effective Secure IoT: the SAFE PLACE Project Case Study, file b765d22c-ddde-46ff-8e3c-5ac90d2866c4 4
Designing Tourism Websites for Children: Guidelines and Experimental Results, file e4239ddc-dcd5-7180-e053-3705fe0a3322 4
Automated Analysis of PUF-based Protocols, file e4239ddd-a933-7180-e053-3705fe0a3322 4
Localizing Firewall Security Policies, file e4239dde-0269-7180-e053-3705fe0a3322 4
Firmware Extraction from Real IoT Devices through Power Analysis of AES, file e4239dde-6ca8-7180-e053-3705fe0a3322 4
Accessible and Usable Websites and Mobile Applications for People with Autism Spectrum Disorders: a Comparative Study, file e4239ddc-494f-7180-e053-3705fe0a3322 3
Evaluating Security, Privacy and Usability Features of QR Code Readers, file e4239ddc-ff51-7180-e053-3705fe0a3322 3
Design and implementation of an airport chatbot, file e4239ddd-359e-7180-e053-3705fe0a3322 3
Learning Sign Language from a Sanbot Robot, file e4239ddd-b481-7180-e053-3705fe0a3322 3
Usable Cryptographic QR Codes, file e4239ddd-fcdd-7180-e053-3705fe0a3322 3
Gathering of robots in a ring with mobile faults, file e4239ddd-ffd3-7180-e053-3705fe0a3322 3
Broadcasting with Mobile Agents in Dynamic Networks, file e4239dde-0538-7180-e053-3705fe0a3322 3
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs, file e4239dde-8ecb-7180-e053-3705fe0a3322 3
Sorting and Election in Anonymous Asynchronous Rings, file e4239ddb-2ec5-7180-e053-3705fe0a3322 2
A semantic based tool for firewall configuration, file e4239ddb-3a3c-7180-e053-3705fe0a3322 2
PIN Cracking is a Guessing Game, file e4239ddb-3b6e-7180-e053-3705fe0a3322 2
Fast SQL Blind Injections in High Latency Networks., file e4239ddb-4368-7180-e053-3705fe0a3322 2
A review of Websites and Mobile Applications for People with Autism Spectrum Disorders: Towards Shared Guidelines, file e4239ddc-1dc1-7180-e053-3705fe0a3322 2
Usable and Accessible Tourism Websites for Children: a Case Study of a Naturalistic Oasis, file e4239ddc-969a-7180-e053-3705fe0a3322 2
Neural-Cryptanalysis of Classical Ciphers, file e4239ddc-da71-7180-e053-3705fe0a3322 2
Gathering of Robots in a Grid with Mobile Faults, file e4239ddd-0899-7180-e053-3705fe0a3322 2
Accessible Tourism for Users with Hearing Loss, file e4239ddd-0c27-7180-e053-3705fe0a3322 2
Security and privacy of QR code applications: A comprehensive study, general guidelines and solutions, file e4239ddd-a92b-7180-e053-3705fe0a3322 2
Mobile Agents Rendezvous in spite of a Malicious Agent., file e4239ddd-ff6f-7180-e053-3705fe0a3322 2
Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors, file e4239dde-01f0-7180-e053-3705fe0a3322 2
Decontamination of Chordal Rings and Tori, file e4239dde-6803-7180-e053-3705fe0a3322 2
Sorting Multisets in Anonymous Rings, file e4239dde-6bb4-7180-e053-3705fe0a3322 2
A formally verified configuration for Hardware Security Modules in the cloud, file e4239dde-a560-7180-e053-3705fe0a3322 2
Secure recharge of disposable RFID tickets, file e4239ddb-2b6f-7180-e053-3705fe0a3322 1
Blunting Differential Attacks on PIN Processing APIs, file e4239ddb-31a8-7180-e053-3705fe0a3322 1
Security and Privacy in Mobile Information and Communication SystemsThird International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers, file e4239ddb-4757-7180-e053-3705fe0a3322 1
Improving PIN Processing API Security, file e4239ddb-4e5d-7180-e053-3705fe0a3322 1
Secure upgrade of hardware security modules in bank networks, file e4239ddb-504f-7180-e053-3705fe0a3322 1
Webpage Accessibility and Usability for Autistic Users: a Case Study on a Tourism Website, file e4239ddc-0c58-7180-e053-3705fe0a3322 1
A New Actor-Based Structure for Distributed Systems, file e4239ddc-1d77-7180-e053-3705fe0a3322 1
Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation, file e4239ddc-1e08-7180-e053-3705fe0a3322 1
A Formal Model for Supporting the Adaptive Access to Virtual Museums, file e4239ddc-1e63-7180-e053-3705fe0a3322 1
Formalizing a model to represent and visualize concept spaces in e-learning environments, file e4239ddc-1e9e-7180-e053-3705fe0a3322 1
Intruder Capture in Sierpinski Graphs., file e4239ddc-1fbf-7180-e053-3705fe0a3322 1
Web accessibility recommendations for the design of tourism websites for people with autism spectrum disorders, file e4239ddc-2823-7180-e053-3705fe0a3322 1
BANANA: A tool for Boundary Ambients Nesting ANAlysis, file e4239ddc-99ef-7180-e053-3705fe0a3322 1
Learning distributed algorithms by programming robots, file e4239ddd-3964-7180-e053-3705fe0a3322 1
Contiguous Search in the Hypercube for Capturing an Intruder, file e4239dde-67c1-7180-e053-3705fe0a3322 1
Totale 1.668
Categoria #
all - tutte 10.529
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 10.529


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20193 0 0 0 0 0 0 0 0 0 0 1 2
2019/20206 1 0 0 0 1 0 0 2 2 0 0 0
2020/2021105 4 3 1 0 0 29 34 9 5 9 3 8
2021/2022257 5 2 25 23 26 11 14 27 13 15 82 14
2022/2023473 12 7 42 43 69 30 43 36 47 58 50 36
2023/2024741 82 46 111 94 58 59 57 74 44 80 36 0
Totale 1.668