CINQUE, MARCELLO
 Distribuzione geografica
Continente #
EU - Europa 145
NA - Nord America 64
AS - Asia 45
AF - Africa 11
SA - Sud America 3
Continente sconosciuto - Info sul continente non disponibili 1
OC - Oceania 1
Totale 270
Nazione #
IT - Italia 103
US - Stati Uniti d'America 64
CN - Cina 18
RU - Federazione Russa 12
IN - India 9
CZ - Repubblica Ceca 6
DE - Germania 6
TW - Taiwan 4
BR - Brasile 3
DZ - Algeria 3
TN - Tunisia 3
VN - Vietnam 3
BE - Belgio 2
CI - Costa d'Avorio 2
EE - Estonia 2
FI - Finlandia 2
FR - Francia 2
HK - Hong Kong 2
ID - Indonesia 2
IE - Irlanda 2
KR - Corea 2
LT - Lituania 2
MY - Malesia 2
A1 - Anonimo 1
AE - Emirati Arabi Uniti 1
AT - Austria 1
AU - Australia 1
BG - Bulgaria 1
CH - Svizzera 1
GB - Regno Unito 1
GH - Ghana 1
JP - Giappone 1
NG - Nigeria 1
NO - Norvegia 1
PH - Filippine 1
PL - Polonia 1
ZA - Sudafrica 1
Totale 270
Città #
Naples 58
Sessa Aurunca 10
Rome 8
Beijing 7
Ashburn 6
Irving 6
Napoli 6
Saint Petersburg 6
Houston 5
Woodbridge 5
Seattle 4
Ann Arbor 3
Dong Ket 3
Hangzhou 3
Los Angeles 3
Milan 3
Wilmington 3
Cambridge 2
Gainesville 2
Guangzhou 2
Imphal 2
Mountain View 2
Taipei 2
University Park 2
Aachen 1
Albany 1
Antwerpen 1
Arese 1
Arlington 1
Bergamo 1
Boardman 1
Brussels 1
Buffalo 1
Cape Town 1
Capua 1
Central 1
Central District 1
Changsha 1
Dearborn 1
Frankfurt am Main 1
Helsinki 1
Henderson 1
Hornchurch 1
Jakarta 1
Kanpur 1
Lappeenranta 1
Makati City 1
Marcianise 1
Medford 1
Morrisville 1
Mumbai 1
New Delhi 1
Niterói 1
Norwalk 1
Oneonta 1
Ottobrunn 1
Petaling Jaya 1
Pompei 1
Portici 1
Roccamonfina 1
Salerno 1
Seoul 1
Serino 1
Shanghai 1
Shenzhen 1
Torino 1
Trofarello 1
Tronoh 1
Vienna 1
Warsaw 1
Woodstock 1
Wuhan 1
Zurich 1
Totale 202
Nome #
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks, file e268a72c-ba85-4c8f-e053-1705fe0a812c 103
On Data Dissemination for Large-Scale Complex Critical Infrastructures, file e268a72c-d114-4c8f-e053-1705fe0a812c 43
LSTM-based failure prediction for railway rolling stock equipment, file 602f4ea8-82b5-49bb-8498-38182440740e 27
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs, file 8b1264f1-32f7-4100-b61d-08cb60ee98f5 20
Virtualization Over Multiprocessor Systems-on-Chip: An Enabling Paradigm for the Industrial Internet of Things, file 3d45816f-b437-43df-9762-a0d55906ff25 19
Integrated Support for Handoff Management and Context-Awareness in Heterogeneous Wireless Networks, file e268a72c-c45e-4c8f-e053-1705fe0a812c 13
An Effective Approach for Injecting Faults in Wireless Sensor Networks Operating Systems, file e268a72c-ce86-4c8f-e053-1705fe0a812c 11
Microservices Monitoring with Event Logs and Black Box Execution Tracing, file 854b76fa-7859-4fd0-93c8-c43c7f35ba6d 3
A graph-based approach to detect unexplained sequences in a log, file 544ec031-bcf0-4114-9097-087610d39ebd 2
An unsupervised approach to discover filtering rules from diagnostic logs, file c5183c40-70ca-4689-ae1b-119bfd31eb90 2
Microservices Monitoring with Event Logs and Black Box Execution Tracing, file c94c4320-6e1e-413f-940e-6dbba75094f0 2
On the injection of hardware faults in virtualized multicore systems, file e268a731-1c35-4c8f-e053-1705fe0a812c 2
Blockchain-empowered decentralised trust management for the Internet of Vehicles security, file e268a731-ad85-4c8f-e053-1705fe0a812c 2
Virtualizing mixed-criticality systems: A survey on industrial trends and issues, file e268a733-84fa-4c8f-e053-1705fe0a812c 2
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets, file 046b8cdd-8d77-4e36-942b-3f97f9a7b06b 1
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems, file 09401543-dbc7-4591-9979-d984cb2f1808 1
AID4TRAIN: Artificial Intelligence-Based Diagnostics for TRAins and INdustry 4.0, file 2108577b-9bc1-4152-b6e2-518a27631d25 1
An empirical analysis of error propagation in critical software systems, file 315457e0-d5f0-4d65-85ff-d3d311c567b9 1
RunPHI: Enabling Mixed-criticality Containers via Partitioning Hypervisors in Industry 4.0, file 3ed5098a-55fc-4010-914b-ef96e7b74482 1
An Exploratory Study on Zeroconf Monitoring of Microservices Systems, file 7a8488f8-36ea-40ce-b379-0898b8ddd260 1
Achieving Isolation in Mixed-Criticality Industrial Edge Systems with Real-Time Containers, file 7d93ad30-e1d8-4bbb-af28-5a497d219832 1
Criticality-Aware Monitoring and Orchestration for Containerized Industry 4.0 Environments, file 88f86f0a-b5a0-4256-b01a-e82337a608f7 1
Preventing timing failures in mixed-criticality clouds with dynamic real-time containers, file 98c4ca9f-cb32-42cc-af44-3dc7c9bd1577 1
Error Monitoring for Legacy Mission-Critical Systems, file 9936ce6c-5cf1-4586-b215-a2d5d65b924b 1
Learning from the ones that got away: Detecting new forms of phishing attacks, file a33723d0-23e6-4407-bc23-1f27419ef0ac 1
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study, file a33cbda9-188c-4c26-9c95-b9c95eb549c4 1
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics, file a62edbb6-8840-4812-ab90-556026ed616d 1
Entropy-Based Security Analytics: Measurements from a Critical Information System, file af1e2fe5-51af-47bb-b178-17e5e42d9706 1
Introducing k4.0s: a Model for Mixed-Criticality Container Orchestration in Industry 4.0, file b21993a8-90ff-4037-919e-ea48c2f97f2c 1
Hierarchical Scheduling for Real-Time Containers in Mixed-Criticality Systems, file bccfc14e-7cde-4e1b-a18f-872743f7d0bc 1
IRIS: a Record and Replay Framework to Enable Hardware-assisted Virtualization Fuzzing, file c35e5cc1-f1f4-48ad-ae1b-ac83b2ee5f8e 1
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks, file c7803c80-81e0-4686-beaf-562a6098fb78 1
Characterizing Direct Monitoring Techniques in Software Systems, file cd953b18-b71e-4cc2-91bf-d073168b781f 1
A framework for on-line timing error detection in software systems, file d32c18f5-3aba-404a-8736-96a8615d32c1 1
To Cloudify or Not to Cloudify: The Question for a Scientific Data Center, file e268a72d-5f25-4c8f-e053-1705fe0a812c 1
Discovering process models for the analysis of application failures under uncertainty of event logs, file e268a731-1c2f-4c8f-e053-1705fe0a812c 1
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination, file e268a731-51c5-4c8f-e053-1705fe0a812c 1
GAMESH: A grid architecture for scalable monitoring and enhanced dependable job scheduling, file e268a731-5252-4c8f-e053-1705fe0a812c 1
Heuristic strategies for assessing wireless sensor network resiliency: an event-based formal approach, file e268a731-544a-4c8f-e053-1705fe0a812c 1
A Reliable Crisis Information System to Share Data after the Event of a Large-Scale Disaster, file e268a732-cb73-4c8f-e053-1705fe0a812c 1
Discovering hidden errors from application log traces with process mining, file ea3c497b-c5d8-4c31-9a88-47b7a2ee5e22 1
Advancing monitoring in microservices systems, file efe229cd-e4bb-458d-a9a7-1af389aa324e 1
Contextual filtering and prioritization of computer application logs for security situational awareness, file f37bfe5c-11b1-4e05-a15f-a91a70e26418 1
Evaluating virtualization for fog monitoring of real-time applications in mixed-criticality systems, file fdab5901-ca7a-4da6-b201-0cb1acc8daac 1
Totale 281
Categoria #
all - tutte 683
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 683


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20193 0 0 0 0 0 0 0 0 0 1 0 2
2019/202020 0 0 3 0 2 1 6 3 1 1 3 0
2020/202120 2 5 0 1 1 0 0 0 0 0 9 2
2021/202212 1 0 0 1 0 0 1 1 2 2 3 1
2022/202360 0 0 7 4 1 2 34 1 3 1 4 3
2023/202484 3 3 19 14 2 10 6 6 10 11 0 0
Totale 281