PECCHIA, ANTONIO
 Distribuzione geografica
Continente #
NA - Nord America 865
EU - Europa 558
AS - Asia 137
AF - Africa 3
OC - Oceania 2
Continente sconosciuto - Info sul continente non disponibili 1
Totale 1.566
Nazione #
US - Stati Uniti d'America 835
IT - Italia 355
CN - Cina 111
IE - Irlanda 48
FI - Finlandia 36
DE - Germania 34
CA - Canada 30
SE - Svezia 20
AT - Austria 15
GB - Regno Unito 12
IN - India 9
RU - Federazione Russa 8
TR - Turchia 8
ES - Italia 6
NL - Olanda 6
LV - Lettonia 5
UA - Ucraina 4
KR - Corea 3
PL - Polonia 3
AU - Australia 2
BE - Belgio 2
CI - Costa d'Avorio 2
FR - Francia 2
IL - Israele 2
RO - Romania 2
DZ - Algeria 1
EU - Europa 1
ID - Indonesia 1
IR - Iran 1
JP - Giappone 1
SG - Singapore 1
Totale 1.566
Città #
Chandler 167
Millbury 59
Napoli 52
Princeton 40
Nanjing 33
Ottawa 27
Boston 25
Des Moines 23
Wilmington 21
Naples 20
Rome 20
Ashburn 18
Beijing 16
Boardman 16
Lawrence 15
Jacksonville 14
Vienna 14
Milan 13
Hebei 11
Shenyang 11
Nanchang 9
Cava De' Tirreni 7
Tianjin 7
Cagliari 6
Changsha 6
Indiana 6
Cisterna 5
Giugliano in Campania 5
Kronberg 5
Redwood City 5
Scafati 5
Seattle 5
Castellammare Di Stabia 4
Houston 4
Kunming 4
Piano di Sorrento 4
Salerno 4
Acerra 3
Amsterdam 3
Ann Arbor 3
Dearborn 3
Ercolano 3
Fairfield 3
Frattaminore 3
Guangzhou 3
Istanbul 3
Livorno 3
Meta 3
Palermo 3
Roseto Capo Spulico 3
San Francisco 3
Seoul 3
Seregno 3
Toronto 3
Västerås 3
Woodbridge 3
Arienzo 2
Aversa 2
Cava 2
Chengdu 2
Dublin 2
Gent 2
Gragnano 2
Horia 2
Jiaxing 2
Lamézia 2
Los Angeles 2
Lucera 2
Marsala 2
Munich 2
New Delhi 2
Norwalk 2
Pignataro Maggiore 2
Shimshit 2
Siano 2
Suri 2
Torino 2
Verona 2
Villaricca 2
Zhengzhou 2
Alfter 1
Antea 1
Ariano Irpino 1
Baltringen 1
Battipaglia 1
Berlin 1
Binasco 1
Borgo San Lorenzo 1
Bowie 1
Cambridge 1
Casalnuovo Di Napoli 1
Castello 1
Cava Dei Tirreni 1
Cercola 1
Crotone 1
Delhi 1
Den Haag 1
Duncan 1
Falls Church 1
Flensburg 1
Totale 831
Nome #
A framework for on-line timing error detection in software systems 70
Challenges and Directions in Security Information and Event Management (SIEM) 66
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks 58
Multiobjective Testing Resource Allocation under Uncertainty 57
Debugging-workflow-aware software reliability growth analysis 56
Microservices Monitoring with Event Logs and Black Box Execution Tracing 52
Criticality-Driven Component Integration in Complex Software Systems 51
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 48
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud 47
A Method to Support Fault Tolerance Design in Service Oriented Computing Systems 46
Assessing and Improving the Effectiveness of Logs for the Analysis of Software Faults 45
A Logging Approach for Effective Dependability Evaluation of Complex Systems 44
A Preliminary Fault Injection Framework for Evaluating Multicore Systems 41
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study 41
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems 41
Advancing monitoring in microservices systems 41
An experiment in memory leak analysis with a mission-critical middleware for Air Traffic Control 39
SVEVIA - Innovative methods and techniques for Software VErification and ValIdAtion of near-realtime complex systems 37
MINIMINDS – Middleware per l’Interoperabilità e l’Integrazione di Sistemi critici per tempo e affidabilità 36
An Approach for Assessing Logs by Software Fault Injection 34
A failure analysis of data distribution middleware in a mission-critical system for air traffic control 32
Empirical Analysis and Validation of Security Alerts Filtering Techniques 32
Contextual filtering and prioritization of computer application logs for security situational awareness 32
Detection of Software Failures through Event Logs: an Experimental Study 31
An empirical analysis of error propagation in critical software systems 31
Memory Leak Analysis of Mission-Critical Middleware 28
Architecture-Based Criticality Assessment of Software Systems 28
Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems 26
Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 26
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets 26
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics 25
On the injection of hardware faults in virtualized multicore systems 24
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 23
On the impact of debugging on software reliability growth analysis: a case study 22
Microservices Monitoring with Event Logs and Black Box Execution Tracing 22
Leveraging Fault Injection Techniques in Critical Industrial Applications 21
Event logging in an industrial development process: Practices and reengineering challenges 21
Discovering hidden errors from application log traces with process mining 21
Industry Practices and Event Logging: Assessment of a Critical Software Development Process 19
Entropy-Based Security Analytics: Measurements from a Critical Information System 19
On the Use of Event Logs for the Analysis of System Failures 18
Towards Secure Monitoring and Control Systems: Diversify! 16
Measuring Resiliency through Field Data: Techniques, Tools and Challenges 16
Message from the RSDA 2014 workshop co-chairs 16
Enabling Effective Dependability Evaluation of Complex Systems via a Rule-Based Logging Framework 15
Event Logs for the Analysis of Software Failures: A Rule-Based Approach 15
Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications 15
Filtering Security Alerts for the Analysis of a Production SaaS Cloud 14
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination 14
Discovering process models for the analysis of application failures under uncertainty of event logs 13
Towards Cognitive Security Defense from Data 13
Towards a Framework for Field Data Production and Management 12
Improving FFDA of Web Servers through a Rule-Based Logging Approach 12
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach 9
The third international workshop on reliability and security data analysis (RSDA 2016) 8
Totale 1.665
Categoria #
all - tutte 5.906
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 5.906


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201916 0 0 0 0 0 0 0 0 0 0 4 12
2019/2020236 66 0 10 18 24 18 14 3 7 8 45 23
2020/2021102 1 1 7 8 15 12 4 10 9 19 15 1
2021/2022369 4 4 1 6 10 17 4 22 54 17 103 127
2022/2023403 62 27 23 25 51 50 15 39 80 5 11 15
2023/2024164 9 44 30 12 12 9 4 35 2 5 2 0
Totale 1.665