DE BENEDICTIS, ALESSANDRA
 Distribuzione geografica
Continente #
NA - Nord America 566
EU - Europa 440
AS - Asia 74
AF - Africa 6
SA - Sud America 4
OC - Oceania 1
Totale 1.091
Nazione #
US - Stati Uniti d'America 551
IT - Italia 329
CN - Cina 55
IE - Irlanda 23
FI - Finlandia 22
CA - Canada 15
DE - Germania 14
GB - Regno Unito 14
PK - Pakistan 8
SE - Svezia 7
FR - Francia 6
CZ - Repubblica Ceca 5
CI - Costa d'Avorio 4
RO - Romania 4
AT - Austria 3
ES - Italia 3
IN - India 3
JP - Giappone 3
SG - Singapore 3
EC - Ecuador 2
NG - Nigeria 2
PL - Polonia 2
PT - Portogallo 2
AU - Australia 1
BE - Belgio 1
BR - Brasile 1
CH - Svizzera 1
CO - Colombia 1
EE - Estonia 1
MY - Malesia 1
NL - Olanda 1
NO - Norvegia 1
TW - Taiwan 1
UA - Ucraina 1
Totale 1.091
Città #
Chandler 80
Millbury 57
Napoli 45
Des Moines 43
Naples 42
Boston 37
Lawrence 34
Princeton 25
Nanjing 20
Ashburn 13
Ottawa 13
Redwood City 11
Wilmington 9
Alvignano 7
Beijing 7
Salerno 7
Quattro Castella 6
Fairfield 5
Hradec Králové 5
Islamabad 5
Nanchang 5
Hebei 4
Jiaxing 4
Modena 4
Rome 4
San Donato Milanese 4
Siena 4
Tianjin 4
Torre Del Greco 4
Boardman 3
Bolzano 3
Karachi 3
Madrid 3
Pozzuoli 3
Strasbourg 3
Trento 3
Watford 3
Afragola 2
Andria 2
Aquila 2
Brescia 2
Changsha 2
Chieti 2
Fremont 2
Guayaquil 2
Lagos 2
Lappeenranta 2
Lioni 2
Lisbon 2
London 2
Marcianise 2
Marigliano 2
Melito Di Napoli 2
Milan 2
Norwalk 2
Oita 2
Palermo 2
Parete 2
Poggiomarino 2
Sant'Antimo 2
Santa Maria a Vico 2
Torino 2
Vigliano Biellese 2
Wang 2
Wiesbaden 2
Woodbridge 2
Zhengzhou 2
Adelaide 1
Altavilla Irpina 1
Amsterdam 1
Bari 1
Billericay 1
Bogotá 1
Borgo San Lorenzo 1
Calvizzano 1
Caserta 1
Casoria 1
Cassino 1
Catanzaro 1
Cedar Knolls 1
Cologne 1
Constanta 1
Council Bluffs 1
Dalmine 1
Dublin 1
Ferrandina 1
Fuzhou 1
Genzano Di Roma 1
Grammichele 1
Greenwich 1
Helsinki 1
Hoeilaart 1
Houston 1
Huddinge 1
Ipoh 1
Jaraguá do Sul 1
Jinan 1
Jinhua 1
Kagoya 1
Kunming 1
Totale 625
Nome #
A methodology for automated penetration testing of cloud applications 46
A cloud secdevops methodology: From design to testing 42
A Secure Architecture for Re-Taskable Sensing Systems 37
Security-aware Deployment Optimization of Cloud-Edge systems in Industrial IoT 36
An automatic tool for benchmark testing of cloud applications 35
A First Step towards an ISO-Based Information Security Domain Ontology 33
Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services 33
On the adoption of Physically Unclonable Functions to secure IIoT devices 32
A model-Based evaluation methodology for smart energy systems 30
Analysis and comparison of security protocols in wireless sensor networks 29
DoS Protection in the Cloud through the SPECS Services 28
Automatically Enforcing Security SLAs in the Cloud 27
Automated risk analysis for IOT systems 27
Cloud security: From per-provider to per-service security SLAs 25
Model-based deployment of secure multi-cloud applications 25
Securing freight trains for hazardous material transportation: a WSN-based monitoring system 24
A PUF-based mutual authentication scheme for Cloud-Edges IoT systems 24
A security metric catalogue for cloud applications 24
A multi-layer moving target defense approach for protecting resource-constrained distributed devices 22
Securing a Tiered Re-Taskable Sensing System 20
A PUF-based hardware mutual authentication protocol 20
A framework for cloud-aware development of bag-of-tasks scientific applications 20
Toward the Adoption of Secure Cyber Digital Twins to Enhance Cyber-Physical Systems Security 19
A Security SLA-driven Methodology to Set-Up Security Capabilities on Top of Cloud Services 19
Providing mobile traffic analysis as-a-Service: Design of a service-based infrastructure to offer high-accuracy traffic classifiers based on hardware accelerators 19
Digital Twins in Healthcare: an architectural proposal and its application in a social distancing case study 18
A moving target defense approach for protecting resource-constrained distributed devices 18
Towards model-based security assessment of cloud applications 18
Monitoring Data Security in the Cloud: A Security SLA-Based Approach 18
Mobile traffic analysis exploiting a cloud infrastructure and hardware accelerators 18
A novel Security-by-Design methodology: Modeling and assessing security by SLAs with a quantitative approach 18
null 17
Preliminary design of a platform-as-a-service to provide security in cloud 17
On the adoption of security SLAs in the cloud 17
SLA-based secure cloud application development 16
Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications 16
MUSA deployer: Deployment of multi-cloud applications 16
A security monitoring system for internet of things 16
A Security and Privacy Validation Methodology for e-Health Systems 16
Per-service security sla: A new model for security management in clouds 15
A moving target defense mechanism for MANETs based on identity virtualization 15
Designing Secure and Resilient Cyber-Physical Systems: a Model-based Moving Target Defense Approach 13
Toward automated threat modeling of edge computing systems 13
Digital Twins for Anomaly Detection in the Industrial Internet of Things: Conceptual Architecture and Proof-of-Concept 12
A Probabilistic Framework for Distributed Localization of Attackers in MANETs 12
PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems 12
Toward the automation of threat modeling and risk assessment in IoT systems 12
Security monitoring in the cloud: An SLA-based approach 11
A probabilistic framework for localization of attackers in MANETs 11
Preface 11
SeNsIM-SEC: security in heterogeneous sensor networks 10
SLA-Based Secure Cloud Application Development: The SPECS Framework 10
Towards AI-assisted digital twins for smart railways: preliminary guideline and reference architecture 9
An SLA-based approach to manage sensor networks as-a-service 9
Security-by-design in multi-cloud applications: An optimization approach 9
An SLA-based brokering platform to provide sensor networks as-a-service 8
SecLA-Based Negotiation and Brokering of Cloud Resources 8
REST-based SLA management for cloud applications 8
SeNsiM-SEC: Secure sensor networks integration to monitor rail freight transport 7
Towards automated penetration testing for cloud applications 7
Per-service security SLAs for cloud security management: Model and implementation 7
Secure software development and testing: A model-based methodology 6
A proposal of a cloud-oriented security and performance simulator provided as-a-service 6
A probabilistic framework for jammer identification in MANETs 6
ISM-AC: an immune security model based on alert correlation and software-defined networking 6
A security SLA-driven moving target defense framework to secure cloud applications 5
SLAs for cloud applications: Agreement protocol and REST-based implementation 5
The convergence of Digital Twins and Distributed Ledger Technologies: A systematic literature review and an architectural proposal 5
Totale 1.203
Categoria #
all - tutte 5.964
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 5.964


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/20196 0 0 0 0 0 0 0 0 0 0 4 2
2019/2020134 41 1 1 8 11 31 8 2 3 6 16 6
2020/2021151 14 4 9 21 4 10 19 21 16 20 9 4
2021/2022336 7 4 4 17 4 1 16 17 37 11 74 144
2022/2023276 61 4 7 5 43 29 7 32 60 7 13 8
2023/2024163 12 36 23 15 7 11 17 16 18 8 0 0
Totale 1.203