CECCARELLI, ANDREA
 Distribuzione geografica
Continente #
EU - Europa 3.661
NA - Nord America 3.377
AS - Asia 1.230
AF - Africa 238
SA - Sud America 101
OC - Oceania 60
Continente sconosciuto - Info sul continente non disponibili 12
Totale 8.679
Nazione #
US - Stati Uniti d'America 3.232
IT - Italia 1.642
DE - Germania 356
FR - Francia 294
CN - Cina 247
GB - Regno Unito 229
IN - India 228
IE - Irlanda 146
NL - Olanda 135
CA - Canada 107
PL - Polonia 107
RU - Federazione Russa 101
SG - Singapore 95
VN - Vietnam 85
CZ - Repubblica Ceca 84
KR - Corea 84
SE - Svezia 66
JP - Giappone 65
IL - Israele 56
BR - Brasile 54
UA - Ucraina 51
AU - Australia 50
TR - Turchia 50
ID - Indonesia 49
IR - Iran 49
AT - Austria 48
GR - Grecia 47
ES - Italia 45
CH - Svizzera 44
PK - Pakistan 43
BE - Belgio 42
FI - Finlandia 42
HK - Hong Kong 41
TN - Tunisia 41
ZA - Sudafrica 37
MX - Messico 32
PT - Portogallo 30
CL - Cile 29
NO - Norvegia 29
HU - Ungheria 25
RO - Romania 24
DZ - Algeria 23
MY - Malesia 21
TW - Taiwan 19
NG - Nigeria 18
TZ - Tanzania 18
EG - Egitto 17
AE - Emirati Arabi Uniti 16
DK - Danimarca 16
IQ - Iraq 16
MA - Marocco 16
SD - Sudan 15
LB - Libano 14
ET - Etiopia 12
LS - Lesotho 12
RS - Serbia 12
LT - Lituania 11
CO - Colombia 10
KE - Kenya 10
NZ - Nuova Zelanda 10
EU - Europa 9
LU - Lussemburgo 9
EE - Estonia 8
TH - Thailandia 7
LK - Sri Lanka 6
PH - Filippine 6
CY - Cipro 5
PE - Perù 5
SA - Arabia Saudita 5
BG - Bulgaria 4
BH - Bahrain 4
AL - Albania 3
GH - Ghana 3
JO - Giordania 3
LV - Lettonia 3
MW - Malawi 3
SN - Senegal 3
ZM - Zambia 3
AM - Armenia 2
BD - Bangladesh 2
BY - Bielorussia 2
CU - Cuba 2
GE - Georgia 2
HR - Croazia 2
KH - Cambogia 2
PA - Panama 2
SK - Slovacchia (Repubblica Slovacca) 2
A1 - Anonimo 1
A2 - ???statistics.table.value.countryCode.A2??? 1
AP - ???statistics.table.value.countryCode.AP??? 1
AR - Argentina 1
AZ - Azerbaigian 1
BO - Bolivia 1
BW - Botswana 1
CD - Congo 1
CI - Costa d'Avorio 1
CM - Camerun 1
HN - Honduras 1
JM - Giamaica 1
KG - Kirghizistan 1
Totale 8.667
Città #
Houston 377
Santa Cruz 254
Ann Arbor 225
Fairfield 223
Ashburn 221
Florence 166
Buffalo 155
Seattle 143
Dublin 136
Milan 123
Woodbridge 116
Rome 95
Cambridge 78
Wilmington 76
Singapore 73
Warsaw 71
Bengaluru 56
Dong Ket 54
Beijing 49
San Diego 46
Duncan 41
Chicago 40
London 38
Turin 38
Bologna 36
Seoul 36
Toronto 35
Helsinki 34
Shanghai 32
Centre Hall 31
Boardman 30
Los Angeles 30
Mountain View 27
Amsterdam 25
Jakarta 25
Ottawa 25
Dallas 23
Padova 23
Paris 23
Vienna 23
Athens 22
Des Moines 22
Las Vegas 22
Naples 21
Tokyo 21
Frankfurt am Main 20
Hangzhou 20
Hyderabad 20
New York 19
Hanoi 18
Moscow 18
Muizenberg 16
Nashua 16
Phoenix 16
Torino 16
Wuhan 16
Budapest 15
Busto Arsizio 15
Clearwater 15
Istanbul 15
Lake Forest 15
Taipei 15
Mumbai 14
Berlin 13
Boulder 13
Brussels 13
Chennai 13
Columbus 13
Council Bluffs 13
Delft 13
Napoli 13
Oslo 13
San Jose 13
Central 12
Guangzhou 12
Gurgaon 12
Munich 12
San Antonio 12
Henderson 11
Krakow 11
Madrid 11
Palermo 11
Salerno 11
Santiago 11
Shenyang 11
Tappahannock 11
Trento 11
Bari 10
Cheyenne 10
Eindhoven 10
Jerusalem 10
Karlsruhe 10
Lahore 10
New Delhi 10
Regensburg 10
Rotterdam 10
San Francisco 10
University Park 10
Verona 10
Belgrade 9
Totale 4.177
Nome #
On Algorithms Selection for Unsupervised Anomaly Detection, file e398c37d-b7e0-179a-e053-3705fe0a4cff 2.488
Context-Awareness to improve Anomaly Detection in Dynamic Service Oriented Architectures, file e398c37a-6ff1-179a-e053-3705fe0a4cff 378
Development and validation of a safe communication protocol compliant to railway standards, file e398c380-e4dd-179a-e053-3705fe0a4cff 377
Continuous Biometric Verification for Non-Repudiation of Remote Services, file e398c37c-12cb-179a-e053-3705fe0a4cff 344
Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile, file e398c37b-ecbb-179a-e053-3705fe0a4cff 316
Quantitative Comparison of Unsupervised Anomaly Detection Algorithms for Intrusion Detection, file e398c380-d5cd-179a-e053-3705fe0a4cff 287
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection, file e398c381-2f04-179a-e053-3705fe0a4cff 259
Continuous User Identity Verification for Trusted Operators in Control Rooms, file e398c379-da86-179a-e053-3705fe0a4cff 254
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application, file e398c381-5448-179a-e053-3705fe0a4cff 237
Exploring Anomaly Detection in Systems of Systems, file e398c37b-203b-179a-e053-3705fe0a4cff 233
A model to discipline autonomy in cyber-physical systems-of-systems and its application, file e398c380-8dc0-179a-e053-3705fe0a4cff 223
Model-Driven Fault Injection in Java Source Code, file e398c380-4901-179a-e053-3705fe0a4cff 217
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d5d2-179a-e053-3705fe0a4cff 206
Detect Adversarial Attacks against Deep Neural Networks with GPU Monitoring, file e398c382-005c-179a-e053-3705fe0a4cff 196
Using metamodels to improve model-based testing of service orchestrations, file e398c380-b033-179a-e053-3705fe0a4cff 177
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c37f-4a34-179a-e053-3705fe0a4cff 175
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c37a-4afb-179a-e053-3705fe0a4cff 170
Identification of critical situations via Event Processing and Event Trust Analysis, file e398c380-c9b1-179a-e053-3705fe0a4cff 163
Continuous and Transparent User Identity Verification for Secure Internet Services, file e398c37f-1ae4-179a-e053-3705fe0a4cff 158
A Monitoring and Testing Framework for Critical Off-the-Shelf Applications and Services, file e398c37d-2023-179a-e053-3705fe0a4cff 157
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c37f-575e-179a-e053-3705fe0a4cff 144
Design, implementation, and assessment of a usable multi-biometric continuous authentication system, file e398c37f-1432-179a-e053-3705fe0a4cff 143
Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach, file e398c380-febf-179a-e053-3705fe0a4cff 137
Exploiting MDE for Platform-Independent Testing of Service Orchestrations, file e398c37e-dfe3-179a-e053-3705fe0a4cff 130
On trustworthy measurements when testing dependable systems: a discussion and experiences, file e398c37f-4703-179a-e053-3705fe0a4cff 118
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c381-07fd-179a-e053-3705fe0a4cff 117
On the educated selection of unsupervised algorithms via attacks and anomaly classes, file e398c37f-3ffa-179a-e053-3705fe0a4cff 97
Introducing Meta-Requirements for Describing System of Systems, file e398c380-b76a-179a-e053-3705fe0a4cff 88
Risk assessment of a biometric continuous authentication protocol for internet services, file e398c37b-9412-179a-e053-3705fe0a4cff 83
Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform, file e398c381-1aa0-179a-e053-3705fe0a4cff 80
benchmarking networked music performance tools with the nmp-bench model and architecture, file e398c381-ab4c-179a-e053-3705fe0a4cff 75
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection, file 2f15baaf-c4bf-43a6-972b-eb4b37be6414 72
Labelling Relevant Events to Support the Crisis Management Operator, file e398c37b-90e4-179a-e053-3705fe0a4cff 70
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape, file 0b6144c5-cc38-4cd3-8718-a827cc12ae85 64
Analysis of critical systems through rigorous, reproducible and comparable experimental assessment, file e398c378-c46e-179a-e053-3705fe0a4cff 63
System and Network Security: Anomaly Detection and Monitoring, file e398c37a-8efa-179a-e053-3705fe0a4cff 62
STECA – Security Threats, Effects and Criticality Analysis: Definition and Application to Smart Grids, file e398c37d-5e52-179a-e053-3705fe0a4cff 61
Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems, file e398c380-2584-179a-e053-3705fe0a4cff 49
Towards security requirements: Iconicity as a feature of an informal modeling language, file e398c37b-b5b0-179a-e053-3705fe0a4cff 36
SYSML-UML Like Modeling Environment Based on Google Blockly Customization, file e398c37d-0571-179a-e053-3705fe0a4cff 35
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c381-14ec-179a-e053-3705fe0a4cff 34
Tolerate Failures of the Visual Camera With Robust Image Classifiers, file b7771d0c-fec1-43ad-ae83-05a6a9386978 33
Robust Traffic Sign Recognition Against Camera Failures, file 0c9eb9ab-78aa-4d1a-a33a-73ce0459c768 31
A multi-criteria ranking of security countermeasures, file e398c381-0de1-179a-e053-3705fe0a4cff 30
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c380-c89b-179a-e053-3705fe0a4cff 21
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c381-14eb-179a-e053-3705fe0a4cff 21
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems, file e398c379-5b75-179a-e053-3705fe0a4cff 16
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach, file e398c37f-2929-179a-e053-3705fe0a4cff 15
Metodo e apparato per una segnalazione resiliente del tempo, file e398c380-bb91-179a-e053-3705fe0a4cff 15
Design and Evaluation of a Safe Driver Machine Interface, file e398c378-a3aa-179a-e053-3705fe0a4cff 10
MADneSs: a Multi-layer Anomaly Detection Framework for Complex Dynamic Systems, file a43863d7-bbc0-4a33-9bda-f7ee3a176e67 8
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard, file ad9f5138-0078-4f40-942b-eb34797d075e 7
A multi-criteria ranking of security countermeasures, file e398c37a-b461-179a-e053-3705fe0a4cff 5
Evaluating Object (Mis)Detection From a Safety and Reliability Perspective: Discussion and Measures, file 334f675c-8e5c-4e2d-b2e2-fbb14a256cae 3
Intrusion detection without attack knowledge: Generating out-of-distribution tabular data, file e397f6e5-ac2f-4ec6-8a9b-bd096149302b 2
Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE), file e398c379-5efd-179a-e053-3705fe0a4cff 2
Towards a Collaborative Framework to Improve Urban Grid Resilience, file e398c37a-5533-179a-e053-3705fe0a4cff 2
Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE), file e398c37a-83b3-179a-e053-3705fe0a4cff 2
Basic concepts on Systems of Systems, file e398c37b-1d8a-179a-e053-3705fe0a4cff 2
Managing dynamicity in SoS, file e398c37b-241c-179a-e053-3705fe0a4cff 2
Time and Resilient Master Clocks in Cyber-Physical Systems, file e398c37b-29e9-179a-e053-3705fe0a4cff 2
A Model-Based Approach for Analyzing the Autonomy Levels for Cyber-Physical Systems-of-Systems, file e398c37e-107a-179a-e053-3705fe0a4cff 2
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d0d8-179a-e053-3705fe0a4cff 2
Towards a General Model for Intrusion Detection: An Exploratory Study, file 955e0aac-7aef-405c-9ccd-a6889831735a 1
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach, file b59ac1cc-f4d5-4533-b67e-4600e6314c22 1
RGB cameras failures and their effects in autonomous driving applications, file d8225124-a1ab-40e3-87e3-0d375db5c055 1
Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems, file e398c378-c038-179a-e053-3705fe0a4cff 1
A testing service for lifelong validation of dynamic SOA, file e398c378-c43b-179a-e053-3705fe0a4cff 1
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b4-179a-e053-3705fe0a4cff 1
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b5-179a-e053-3705fe0a4cff 1
ALARP (A Railway Automatic Track Warning System Based on Distributed Personal Mobile Terminals), file e398c378-f7e6-179a-e053-3705fe0a4cff 1
Experimental Validation of a Synchronization Uncertainty-Aware Software Clock, file e398c379-587b-179a-e053-3705fe0a4cff 1
Analysis of Companies Gaps in the Application of Standards for Safety-Critical Software, file e398c379-587e-179a-e053-3705fe0a4cff 1
Safe Estimation of Time Uncertainty of Local Clocks, file e398c379-5f02-179a-e053-3705fe0a4cff 1
An Experimental Framework for the Analysis and Validation of Software Clocks, file e398c379-5f04-179a-e053-3705fe0a4cff 1
On the impact of emergent properties on SoS security, file e398c37a-8395-179a-e053-3705fe0a4cff 1
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c37a-84cb-179a-e053-3705fe0a4cff 1
Experimental assessment of low-cost GPS-based localization in railway worksite-like scenarios, file e398c37a-8b3e-179a-e053-3705fe0a4cff 1
A Hazus-based method for assessing robustness of electricity supply to critical smart grid consumers during flood events, file e398c37a-a947-179a-e053-3705fe0a4cff 1
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results, file e398c37e-91a0-179a-e053-3705fe0a4cff 1
The SAMBA approach for self-adaptive model-based online testing of services orchestrations, file e398c37e-91a2-179a-e053-3705fe0a4cff 1
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c380-e187-179a-e053-3705fe0a4cff 1
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c381-0028-179a-e053-3705fe0a4cff 1
Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?, file e398c381-d02d-179a-e053-3705fe0a4cff 1
Totale 9.027
Categoria #
all - tutte 16.075
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 16.075


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019207 0 0 0 0 0 0 0 0 0 57 65 85
2019/2020837 60 53 40 73 91 83 56 67 51 93 96 74
2020/20211.538 71 89 73 112 120 99 89 108 268 154 197 158
2021/20222.624 214 124 161 456 365 140 140 120 140 164 357 243
2022/20231.954 125 138 298 245 165 155 165 184 187 105 106 81
2023/20241.385 81 126 160 152 164 134 192 158 103 115 0 0
Totale 9.027