PECCHIA, ANTONIO
 Distribuzione geografica
Continente #
EU - Europa 26
AS - Asia 5
NA - Nord America 3
AF - Africa 1
Totale 35
Nazione #
IT - Italia 24
US - Stati Uniti d'America 3
CN - Cina 2
BD - Bangladesh 1
CZ - Repubblica Ceca 1
ID - Indonesia 1
IE - Irlanda 1
IR - Iran 1
ZA - Sudafrica 1
Totale 35
Città #
Naples 17
Napoli 3
Beijing 2
Mount Olive 2
Dhaka 1
Jakarta 1
Liberec 1
Sessa Aurunca 1
Waldorf 1
Totale 29
Nome #
Towards Secure Monitoring and Control Systems: Diversify!, file e268a72c-d4e8-4c8f-e053-1705fe0a812c 15
Microservices Monitoring with Event Logs and Black Box Execution Tracing, file 854b76fa-7859-4fd0-93c8-c43c7f35ba6d 3
Microservices Monitoring with Event Logs and Black Box Execution Tracing, file c94c4320-6e1e-413f-940e-6dbba75094f0 2
On the injection of hardware faults in virtualized multicore systems, file e268a731-1c35-4c8f-e053-1705fe0a812c 2
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets, file 046b8cdd-8d77-4e36-942b-3f97f9a7b06b 1
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems, file 09401543-dbc7-4591-9979-d984cb2f1808 1
An empirical analysis of error propagation in critical software systems, file 315457e0-d5f0-4d65-85ff-d3d311c567b9 1
An Exploratory Study on Zeroconf Monitoring of Microservices Systems, file 7a8488f8-36ea-40ce-b379-0898b8ddd260 1
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study, file a33cbda9-188c-4c26-9c95-b9c95eb549c4 1
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics, file a62edbb6-8840-4812-ab90-556026ed616d 1
Entropy-Based Security Analytics: Measurements from a Critical Information System, file af1e2fe5-51af-47bb-b178-17e5e42d9706 1
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks, file c7803c80-81e0-4686-beaf-562a6098fb78 1
A framework for on-line timing error detection in software systems, file d32c18f5-3aba-404a-8736-96a8615d32c1 1
Discovering process models for the analysis of application failures under uncertainty of event logs, file e268a731-1c2f-4c8f-e053-1705fe0a812c 1
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination, file e268a731-51c5-4c8f-e053-1705fe0a812c 1
Discovering hidden errors from application log traces with process mining, file ea3c497b-c5d8-4c31-9a88-47b7a2ee5e22 1
Advancing monitoring in microservices systems, file efe229cd-e4bb-458d-a9a7-1af389aa324e 1
Contextual filtering and prioritization of computer application logs for security situational awareness, file f37bfe5c-11b1-4e05-a15f-a91a70e26418 1
Totale 36
Categoria #
all - tutte 97
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 97


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202 0 0 0 0 0 0 0 0 0 1 1 0
2020/20214 0 0 0 0 0 0 0 0 0 1 3 0
2021/20224 0 0 0 0 0 0 0 0 1 1 2 0
2022/202319 0 0 0 0 0 0 16 0 1 1 1 0
2023/20241 0 0 1 0 0 0 0 0 0 0 0 0
Totale 36