CECCARELLI, ANDREA
 Distribuzione geografica
Continente #
EU - Europa 3.691
NA - Nord America 3.405
AS - Asia 1.242
AF - Africa 238
SA - Sud America 101
OC - Oceania 62
Continente sconosciuto - Info sul continente non disponibili 12
Totale 8.751
Nazione #
US - Stati Uniti d'America 3.260
IT - Italia 1.652
DE - Germania 362
FR - Francia 295
CN - Cina 255
GB - Regno Unito 233
IN - India 230
IE - Irlanda 146
NL - Olanda 137
CA - Canada 107
PL - Polonia 107
RU - Federazione Russa 101
SG - Singapore 95
VN - Vietnam 85
CZ - Repubblica Ceca 84
KR - Corea 84
SE - Svezia 66
JP - Giappone 65
IL - Israele 56
BR - Brasile 54
AU - Australia 52
UA - Ucraina 52
TR - Turchia 50
AT - Austria 49
ID - Indonesia 49
IR - Iran 49
GR - Grecia 47
ES - Italia 46
CH - Svizzera 44
FI - Finlandia 44
PK - Pakistan 43
BE - Belgio 42
HK - Hong Kong 42
TN - Tunisia 41
ZA - Sudafrica 37
MX - Messico 32
NO - Norvegia 31
PT - Portogallo 30
CL - Cile 29
HU - Ungheria 25
RO - Romania 24
DZ - Algeria 23
MY - Malesia 21
TW - Taiwan 19
NG - Nigeria 18
TZ - Tanzania 18
EG - Egitto 17
AE - Emirati Arabi Uniti 16
DK - Danimarca 16
IQ - Iraq 16
MA - Marocco 16
SD - Sudan 15
LB - Libano 14
ET - Etiopia 12
LS - Lesotho 12
RS - Serbia 12
LT - Lituania 11
CO - Colombia 10
KE - Kenya 10
NZ - Nuova Zelanda 10
EU - Europa 9
LU - Lussemburgo 9
EE - Estonia 8
TH - Thailandia 7
LK - Sri Lanka 6
PH - Filippine 6
CY - Cipro 5
PE - Perù 5
SA - Arabia Saudita 5
BG - Bulgaria 4
BH - Bahrain 4
AL - Albania 3
GH - Ghana 3
JO - Giordania 3
LV - Lettonia 3
MW - Malawi 3
SN - Senegal 3
ZM - Zambia 3
AM - Armenia 2
AZ - Azerbaigian 2
BD - Bangladesh 2
BY - Bielorussia 2
CU - Cuba 2
GE - Georgia 2
HR - Croazia 2
KH - Cambogia 2
PA - Panama 2
SK - Slovacchia (Repubblica Slovacca) 2
A1 - Anonimo 1
A2 - ???statistics.table.value.countryCode.A2??? 1
AP - ???statistics.table.value.countryCode.AP??? 1
AR - Argentina 1
BO - Bolivia 1
BW - Botswana 1
CD - Congo 1
CI - Costa d'Avorio 1
CM - Camerun 1
HN - Honduras 1
JM - Giamaica 1
KG - Kirghizistan 1
Totale 8.739
Città #
Houston 377
Santa Cruz 254
Ann Arbor 225
Ashburn 224
Fairfield 223
Florence 167
Buffalo 155
Seattle 143
Dublin 136
Milan 126
Woodbridge 116
Rome 95
Cambridge 78
Wilmington 76
Singapore 73
Warsaw 71
Bengaluru 56
Beijing 54
Dong Ket 54
San Diego 46
Duncan 41
Chicago 40
London 40
Turin 38
Bologna 36
Helsinki 36
Seoul 36
Toronto 35
Shanghai 32
Boardman 31
Centre Hall 31
Los Angeles 31
Columbus 30
Mountain View 27
Amsterdam 26
Jakarta 25
Ottawa 25
Padova 24
Vienna 24
Dallas 23
Paris 23
Athens 22
Des Moines 22
Las Vegas 22
Naples 21
Tokyo 21
Frankfurt am Main 20
Hangzhou 20
Hyderabad 20
New York 19
Hanoi 18
Moscow 18
Muizenberg 16
Nashua 16
Phoenix 16
Torino 16
Wuhan 16
Budapest 15
Busto Arsizio 15
Clearwater 15
Istanbul 15
Lake Forest 15
Taipei 15
Mumbai 14
Berlin 13
Boulder 13
Brussels 13
Chennai 13
Council Bluffs 13
Delft 13
Napoli 13
Oslo 13
San Jose 13
Central 12
Changsha 12
Guangzhou 12
Gurgaon 12
Madrid 12
Munich 12
Regensburg 12
San Antonio 12
Trento 12
Henderson 11
Krakow 11
Palermo 11
Salerno 11
Santiago 11
Shenyang 11
Tappahannock 11
Verona 11
Bari 10
Cheyenne 10
Eindhoven 10
Jerusalem 10
Karlsruhe 10
Lahore 10
Melbourne 10
New Delhi 10
Rotterdam 10
San Francisco 10
Totale 4.223
Nome #
On Algorithms Selection for Unsupervised Anomaly Detection, file e398c37d-b7e0-179a-e053-3705fe0a4cff 2.497
Context-Awareness to improve Anomaly Detection in Dynamic Service Oriented Architectures, file e398c37a-6ff1-179a-e053-3705fe0a4cff 383
Development and validation of a safe communication protocol compliant to railway standards, file e398c380-e4dd-179a-e053-3705fe0a4cff 380
Continuous Biometric Verification for Non-Repudiation of Remote Services, file e398c37c-12cb-179a-e053-3705fe0a4cff 345
Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile, file e398c37b-ecbb-179a-e053-3705fe0a4cff 317
Quantitative Comparison of Unsupervised Anomaly Detection Algorithms for Intrusion Detection, file e398c380-d5cd-179a-e053-3705fe0a4cff 296
Prepare for trouble and make it double! Supervised – Unsupervised stacking for anomaly-based intrusion detection, file e398c381-2f04-179a-e053-3705fe0a4cff 262
Continuous User Identity Verification for Trusted Operators in Control Rooms, file e398c379-da86-179a-e053-3705fe0a4cff 256
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application, file e398c381-5448-179a-e053-3705fe0a4cff 238
Exploring Anomaly Detection in Systems of Systems, file e398c37b-203b-179a-e053-3705fe0a4cff 235
A model to discipline autonomy in cyber-physical systems-of-systems and its application, file e398c380-8dc0-179a-e053-3705fe0a4cff 226
Model-Driven Fault Injection in Java Source Code, file e398c380-4901-179a-e053-3705fe0a4cff 217
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d5d2-179a-e053-3705fe0a4cff 206
Detect Adversarial Attacks against Deep Neural Networks with GPU Monitoring, file e398c382-005c-179a-e053-3705fe0a4cff 197
Using metamodels to improve model-based testing of service orchestrations, file e398c380-b033-179a-e053-3705fe0a4cff 181
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c37f-4a34-179a-e053-3705fe0a4cff 179
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c37a-4afb-179a-e053-3705fe0a4cff 171
Identification of critical situations via Event Processing and Event Trust Analysis, file e398c380-c9b1-179a-e053-3705fe0a4cff 163
A Monitoring and Testing Framework for Critical Off-the-Shelf Applications and Services, file e398c37d-2023-179a-e053-3705fe0a4cff 158
Continuous and Transparent User Identity Verification for Secure Internet Services, file e398c37f-1ae4-179a-e053-3705fe0a4cff 158
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c37f-575e-179a-e053-3705fe0a4cff 144
Design, implementation, and assessment of a usable multi-biometric continuous authentication system, file e398c37f-1432-179a-e053-3705fe0a4cff 143
Engineering Functional Safety Requirements for Automotive Systems: A Cyber-Physical-Social Approach, file e398c380-febf-179a-e053-3705fe0a4cff 137
Exploiting MDE for Platform-Independent Testing of Service Orchestrations, file e398c37e-dfe3-179a-e053-3705fe0a4cff 133
On trustworthy measurements when testing dependable systems: a discussion and experiences, file e398c37f-4703-179a-e053-3705fe0a4cff 118
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c381-07fd-179a-e053-3705fe0a4cff 117
On the educated selection of unsupervised algorithms via attacks and anomaly classes, file e398c37f-3ffa-179a-e053-3705fe0a4cff 99
Introducing Meta-Requirements for Describing System of Systems, file e398c380-b76a-179a-e053-3705fe0a4cff 88
Risk assessment of a biometric continuous authentication protocol for internet services, file e398c37b-9412-179a-e053-3705fe0a4cff 84
Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform, file e398c381-1aa0-179a-e053-3705fe0a4cff 80
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection, file 2f15baaf-c4bf-43a6-972b-eb4b37be6414 77
benchmarking networked music performance tools with the nmp-bench model and architecture, file e398c381-ab4c-179a-e053-3705fe0a4cff 75
Labelling Relevant Events to Support the Crisis Management Operator, file e398c37b-90e4-179a-e053-3705fe0a4cff 70
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape, file 0b6144c5-cc38-4cd3-8718-a827cc12ae85 65
Analysis of critical systems through rigorous, reproducible and comparable experimental assessment, file e398c378-c46e-179a-e053-3705fe0a4cff 63
System and Network Security: Anomaly Detection and Monitoring, file e398c37a-8efa-179a-e053-3705fe0a4cff 62
STECA – Security Threats, Effects and Criticality Analysis: Definition and Application to Smart Grids, file e398c37d-5e52-179a-e053-3705fe0a4cff 61
Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems, file e398c380-2584-179a-e053-3705fe0a4cff 49
SYSML-UML Like Modeling Environment Based on Google Blockly Customization, file e398c37d-0571-179a-e053-3705fe0a4cff 39
Towards security requirements: Iconicity as a feature of an informal modeling language, file e398c37b-b5b0-179a-e053-3705fe0a4cff 36
Tolerate Failures of the Visual Camera With Robust Image Classifiers, file b7771d0c-fec1-43ad-ae83-05a6a9386978 35
Robust Traffic Sign Recognition Against Camera Failures, file 0c9eb9ab-78aa-4d1a-a33a-73ce0459c768 34
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c381-14ec-179a-e053-3705fe0a4cff 34
A multi-criteria ranking of security countermeasures, file e398c381-0de1-179a-e053-3705fe0a4cff 30
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c380-c89b-179a-e053-3705fe0a4cff 21
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c381-14eb-179a-e053-3705fe0a4cff 21
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems, file e398c379-5b75-179a-e053-3705fe0a4cff 16
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach, file e398c37f-2929-179a-e053-3705fe0a4cff 15
Metodo e apparato per una segnalazione resiliente del tempo, file e398c380-bb91-179a-e053-3705fe0a4cff 15
Design and Evaluation of a Safe Driver Machine Interface, file e398c378-a3aa-179a-e053-3705fe0a4cff 10
MADneSs: a Multi-layer Anomaly Detection Framework for Complex Dynamic Systems, file a43863d7-bbc0-4a33-9bda-f7ee3a176e67 9
Safe Maintenance of Railways using COTS Mobile Devices: The Remote Worker Dashboard, file ad9f5138-0078-4f40-942b-eb34797d075e 7
A multi-criteria ranking of security countermeasures, file e398c37a-b461-179a-e053-3705fe0a4cff 5
Evaluating Object (Mis)Detection From a Safety and Reliability Perspective: Discussion and Measures, file 334f675c-8e5c-4e2d-b2e2-fbb14a256cae 3
Intrusion detection without attack knowledge: Generating out-of-distribution tabular data, file e397f6e5-ac2f-4ec6-8a9b-bd096149302b 2
Workshop on Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE), file e398c379-5efd-179a-e053-3705fe0a4cff 2
Towards a Collaborative Framework to Improve Urban Grid Resilience, file e398c37a-5533-179a-e053-3705fe0a4cff 2
Recent Advances in the DependabIlity AssessmeNt of Complex systEms (RADIANCE), file e398c37a-83b3-179a-e053-3705fe0a4cff 2
Basic concepts on Systems of Systems, file e398c37b-1d8a-179a-e053-3705fe0a4cff 2
Managing dynamicity in SoS, file e398c37b-241c-179a-e053-3705fe0a4cff 2
Time and Resilient Master Clocks in Cyber-Physical Systems, file e398c37b-29e9-179a-e053-3705fe0a4cff 2
A Model-Based Approach for Analyzing the Autonomy Levels for Cyber-Physical Systems-of-Systems, file e398c37e-107a-179a-e053-3705fe0a4cff 2
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d0d8-179a-e053-3705fe0a4cff 2
Towards a General Model for Intrusion Detection: An Exploratory Study, file 955e0aac-7aef-405c-9ccd-a6889831735a 1
Federated and Generative Data Sharing for Data-Driven Security: Challenges and Approach, file b59ac1cc-f4d5-4533-b67e-4600e6314c22 1
RGB cameras failures and their effects in autonomous driving applications, file d8225124-a1ab-40e3-87e3-0d375db5c055 1
Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems, file e398c378-c038-179a-e053-3705fe0a4cff 1
A testing service for lifelong validation of dynamic SOA, file e398c378-c43b-179a-e053-3705fe0a4cff 1
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b4-179a-e053-3705fe0a4cff 1
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b5-179a-e053-3705fe0a4cff 1
ALARP (A Railway Automatic Track Warning System Based on Distributed Personal Mobile Terminals), file e398c378-f7e6-179a-e053-3705fe0a4cff 1
Experimental Validation of a Synchronization Uncertainty-Aware Software Clock, file e398c379-587b-179a-e053-3705fe0a4cff 1
Analysis of Companies Gaps in the Application of Standards for Safety-Critical Software, file e398c379-587e-179a-e053-3705fe0a4cff 1
Safe Estimation of Time Uncertainty of Local Clocks, file e398c379-5f02-179a-e053-3705fe0a4cff 1
An Experimental Framework for the Analysis and Validation of Software Clocks, file e398c379-5f04-179a-e053-3705fe0a4cff 1
On the impact of emergent properties on SoS security, file e398c37a-8395-179a-e053-3705fe0a4cff 1
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c37a-84cb-179a-e053-3705fe0a4cff 1
Experimental assessment of low-cost GPS-based localization in railway worksite-like scenarios, file e398c37a-8b3e-179a-e053-3705fe0a4cff 1
A Hazus-based method for assessing robustness of electricity supply to critical smart grid consumers during flood events, file e398c37a-a947-179a-e053-3705fe0a4cff 1
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results, file e398c37e-91a0-179a-e053-3705fe0a4cff 1
The SAMBA approach for self-adaptive model-based online testing of services orchestrations, file e398c37e-91a2-179a-e053-3705fe0a4cff 1
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c380-e187-179a-e053-3705fe0a4cff 1
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c381-0028-179a-e053-3705fe0a4cff 1
Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?, file e398c381-d02d-179a-e053-3705fe0a4cff 1
Totale 9.099
Categoria #
all - tutte 16.479
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 16.479


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019150 0 0 0 0 0 0 0 0 0 0 65 85
2019/2020837 60 53 40 73 91 83 56 67 51 93 96 74
2020/20211.538 71 89 73 112 120 99 89 108 268 154 197 158
2021/20222.624 214 124 161 456 365 140 140 120 140 164 357 243
2022/20231.954 125 138 298 245 165 155 165 184 187 105 106 81
2023/20241.457 81 126 160 152 164 134 192 158 103 115 72 0
Totale 9.099