BONDAVALLI, ANDREA
 Distribuzione geografica
Continente #
NA - Nord America 3.838
EU - Europa 3.602
AS - Asia 1.177
AF - Africa 241
SA - Sud America 108
OC - Oceania 71
Continente sconosciuto - Info sul continente non disponibili 14
Totale 9.051
Nazione #
US - Stati Uniti d'America 3.677
IT - Italia 1.631
DE - Germania 388
CN - Cina 254
GB - Regno Unito 231
IN - India 204
FR - Francia 203
IE - Irlanda 181
PL - Polonia 119
CA - Canada 111
NL - Olanda 106
SG - Singapore 99
VN - Vietnam 99
SE - Svezia 93
RU - Federazione Russa 85
CZ - Repubblica Ceca 73
JP - Giappone 73
KR - Corea 73
AU - Australia 60
BR - Brasile 58
TR - Turchia 57
ID - Indonesia 56
CH - Svizzera 50
RO - Romania 49
GR - Grecia 48
ZA - Sudafrica 48
IL - Israele 45
IR - Iran 44
ES - Italia 43
TN - Tunisia 42
UA - Ucraina 37
BE - Belgio 36
CL - Cile 33
NO - Norvegia 33
PT - Portogallo 32
AT - Austria 31
EG - Egitto 30
HU - Ungheria 29
MX - Messico 29
PK - Pakistan 28
HK - Hong Kong 27
FI - Finlandia 25
DZ - Algeria 24
MY - Malesia 21
DK - Danimarca 19
TZ - Tanzania 18
SD - Sudan 15
LB - Libano 14
NG - Nigeria 14
MA - Marocco 13
LS - Lesotho 12
HN - Honduras 11
NZ - Nuova Zelanda 11
RS - Serbia 11
TW - Taiwan 11
EU - Europa 10
KE - Kenya 10
LI - Liechtenstein 10
LT - Lituania 10
CO - Colombia 9
IQ - Iraq 9
PH - Filippine 8
TH - Thailandia 8
AE - Emirati Arabi Uniti 6
LK - Sri Lanka 6
SA - Arabia Saudita 6
BG - Bulgaria 5
BZ - Belize 5
CY - Cipro 5
EE - Estonia 5
LU - Lussemburgo 5
BH - Bahrain 4
PE - Perù 4
SK - Slovacchia (Repubblica Slovacca) 4
ET - Etiopia 3
HR - Croazia 3
JO - Giordania 3
KH - Cambogia 3
SC - Seychelles 3
VE - Venezuela 3
A1 - Anonimo 2
AZ - Azerbaigian 2
BD - Bangladesh 2
BY - Bielorussia 2
GE - Georgia 2
LV - Lettonia 2
PA - Panama 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AL - Albania 1
AM - Armenia 1
AP - ???statistics.table.value.countryCode.AP??? 1
BO - Bolivia 1
BW - Botswana 1
CD - Congo 1
CI - Costa d'Avorio 1
CM - Camerun 1
CU - Cuba 1
GH - Ghana 1
JM - Giamaica 1
KG - Kirghizistan 1
Totale 9.038
Città #
Houston 418
Santa Cruz 284
Fairfield 251
Ann Arbor 250
Ashburn 218
Florence 189
Buffalo 184
Dublin 171
Seattle 148
Woodbridge 140
Milan 125
Wilmington 93
Cambridge 91
Rome 87
Warsaw 73
Singapore 70
Dong Ket 64
Bengaluru 57
San Diego 48
London 47
Toronto 46
Chicago 43
Duncan 43
Beijing 42
Boardman 37
Bologna 37
Mountain View 36
Dallas 33
Shanghai 33
Los Angeles 32
Naples 32
Centre Hall 31
Fleming Island 30
Turin 30
Tokyo 29
Las Vegas 27
Hanoi 25
San Jose 25
Clearwater 24
Muizenberg 24
Hangzhou 23
New York 23
Ottawa 23
Shenyang 23
Athens 22
Paris 22
Henderson 20
Frankfurt am Main 19
Padova 19
Seoul 19
Council Bluffs 18
Guangzhou 17
Jakarta 17
Lake Forest 17
Torino 17
Berlin 16
Brisbane 16
Brooklyn 16
Istanbul 16
Nashua 16
Phoenix 16
Helsinki 15
Linköping 15
Boulder 14
Busto Arsizio 14
Hamburg 14
Palermo 14
Tappahannock 14
Vienna 14
Ottobrunn 13
Changsha 12
Gurgaon 12
Ankara 11
Cedar Knolls 11
Central 11
Cheyenne 11
Dearborn 11
Falls Church 11
Jerusalem 11
Krakow 11
Munich 11
Provo 11
Salerno 11
Santiago 11
Wuhan 11
Budapest 10
Des Moines 10
Eindhoven 10
Kish 10
Leawood 10
Madrid 10
New Delhi 10
Oslo 10
San Francisco 10
Trento 10
University Park 10
Verona 10
Amsterdam 9
Bari 9
Cairo 9
Totale 4.503
Nome #
On Algorithms Selection for Unsupervised Anomaly Detection, file e398c37d-b7e0-179a-e053-3705fe0a4cff 2.409
Context-Awareness to improve Anomaly Detection in Dynamic Service Oriented Architectures, file e398c37a-6ff1-179a-e053-3705fe0a4cff 360
Continuous Biometric Verification for Non-Repudiation of Remote Services, file e398c37c-12cb-179a-e053-3705fe0a4cff 336
Systems-of-systems modeling using a comprehensive viewpoint-based SysML profile, file e398c37b-ecbb-179a-e053-3705fe0a4cff 317
Development and validation of a safe communication protocol compliant to railway standards, file e398c380-e4dd-179a-e053-3705fe0a4cff 302
CYBER-PHYSICAL SYSTEMS OF SYSTEMS Foundations, a conceptual model and some derivations: the AMADEOS legacy, file e398c37d-3228-179a-e053-3705fe0a4cff 294
Certifications of Critical Systems - The CECRIS Experience, file e398c37d-4b3b-179a-e053-3705fe0a4cff 250
Continuous User Identity Verification for Trusted Operators in Control Rooms, file e398c379-da86-179a-e053-3705fe0a4cff 249
On the evaluation measures for machine learning algorithms for safety-critical systems, file e398c380-a08e-179a-e053-3705fe0a4cff 213
Quantitative Comparison of Unsupervised Anomaly Detection Algorithms for Intrusion Detection, file e398c380-d5cd-179a-e053-3705fe0a4cff 209
Exploring Anomaly Detection in Systems of Systems, file e398c37b-203b-179a-e053-3705fe0a4cff 207
A conceptual model for analyzing information quality in System-of-Systems, file e398c37c-695d-179a-e053-3705fe0a4cff 195
Composable Framework Support for Software-FMEA through Model Execution, file e398c37d-4b3f-179a-e053-3705fe0a4cff 185
Towards Trustworthy Autonomous Systems: Taxonomies and Future Perspectives, file 16c7d915-009b-4635-9913-73d871243a3d 182
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d5d2-179a-e053-3705fe0a4cff 181
Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application, file e398c381-5448-179a-e053-3705fe0a4cff 180
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c37f-4a34-179a-e053-3705fe0a4cff 168
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c37a-4afb-179a-e053-3705fe0a4cff 164
Identification of critical situations via Event Processing and Event Trust Analysis, file e398c380-c9b1-179a-e053-3705fe0a4cff 164
Continuous and Transparent User Identity Verification for Secure Internet Services, file e398c37f-1ae4-179a-e053-3705fe0a4cff 152
A Monitoring and Testing Framework for Critical Off-the-Shelf Applications and Services, file e398c37d-2023-179a-e053-3705fe0a4cff 146
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c37f-575e-179a-e053-3705fe0a4cff 146
Design, implementation, and assessment of a usable multi-biometric continuous authentication system, file e398c37f-1432-179a-e053-3705fe0a4cff 144
QoS Perceived by Users of Ubiquitous UMTS:Compositional Models and Thorough Analysis, file e398c378-a392-179a-e053-3705fe0a4cff 134
Performability analysis of a tramway system with virtual tags and local positioning, file e398c37f-8b21-179a-e053-3705fe0a4cff 134
Emergence in cyber-physical systems-of-systems (CPSoSs), file e398c37d-3227-179a-e053-3705fe0a4cff 130
Toward a model-based approach for analyzing information quality requirements for smart grid, file e398c37e-c629-179a-e053-3705fe0a4cff 120
System-of-Systems to Support Mobile Safety Critical Applications: Open Challenges and Viable Solutions, file e398c381-07fd-179a-e053-3705fe0a4cff 117
Modeling QoE in Dependable Tele-Immersive Applications: A Case Study of World Opera, file e398c37a-75a2-179a-e053-3705fe0a4cff 115
A template-based methodology for the specification and automated composition of performability models, file e398c37f-4220-179a-e053-3705fe0a4cff 106
On trustworthy measurements when testing dependable systems: a discussion and experiences, file e398c37f-4703-179a-e053-3705fe0a4cff 106
On the educated selection of unsupervised algorithms via attacks and anomaly classes, file e398c37f-3ffa-179a-e053-3705fe0a4cff 91
Meta-learning to improve unsupervised intrusion detection in cyber-physical systems, file e398c381-2793-179a-e053-3705fe0a4cff 91
Introducing Meta-Requirements for Describing System of Systems, file e398c380-b76a-179a-e053-3705fe0a4cff 88
A Model-Based Approach to Support Safety-Related Decisions in the Petroleum Domain, file e398c380-e647-179a-e053-3705fe0a4cff 81
Model-based Evaluation of Scalability and Security Tradeoffs: a Case Study on a Multi-Service Platform, file e398c381-1aa0-179a-e053-3705fe0a4cff 78
Risk assessment of a biometric continuous authentication protocol for internet services, file e398c37b-9412-179a-e053-3705fe0a4cff 75
Labelling Relevant Events to Support the Crisis Management Operator, file e398c37b-90e4-179a-e053-3705fe0a4cff 71
Cost Estimation for Independent Systems Verification and Validation, file e398c37d-0573-179a-e053-3705fe0a4cff 66
Lightweight Formal Analysis of Requirements, file e398c37d-0575-179a-e053-3705fe0a4cff 58
A requirements-driven methodology for the proper selection and configuration of blockchains, file e398c380-c4aa-179a-e053-3705fe0a4cff 53
Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems, file e398c380-2584-179a-e053-3705fe0a4cff 49
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection, file 2f15baaf-c4bf-43a6-972b-eb4b37be6414 42
Unsupervised Anomaly Detectors to Detect Intrusions in the Current Threat Landscape, file 0b6144c5-cc38-4cd3-8718-a827cc12ae85 41
Stochastic Activity Networks Templates: Supporting Variability in Performability Models, file e398c381-dff5-179a-e053-3705fe0a4cff 39
SYSML-UML Like Modeling Environment Based on Google Blockly Customization, file e398c37d-0571-179a-e053-3705fe0a4cff 36
Differential analysis of Operating System indicators for anomaly detection in dependable systems: An experimental study, file e398c381-14ec-179a-e053-3705fe0a4cff 33
A multi-criteria ranking of security countermeasures, file e398c381-0de1-179a-e053-3705fe0a4cff 32
Impact of Machine Learning on Safety Monitors, file 74180b41-c9de-4d8b-ab5d-8dd2c753cb38 31
A stochastic modeling approach for traffic analysis of a tramway system with virtual tags and local positioning, file e398c381-56ec-179a-e053-3705fe0a4cff 31
On the Need of a Methodological Approach for the Assessment of Software Architectures within ISO26262, file e398c378-faa5-179a-e053-3705fe0a4cff 26
Tolerate Failures of the Visual Camera With Robust Image Classifiers, file b7771d0c-fec1-43ad-ae83-05a6a9386978 25
A template-based methodology for the specification and automated composition of performability models, file e398c380-d3ff-179a-e053-3705fe0a4cff 25
Robust Traffic Sign Recognition Against Camera Failures, file 0c9eb9ab-78aa-4d1a-a33a-73ce0459c768 24
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c380-c89b-179a-e053-3705fe0a4cff 21
Enhancing workers safety in worksites through augmented GNSS sensors, file e398c381-14eb-179a-e053-3705fe0a4cff 19
A Multi-layer Anomaly Detector for Dynamic Service-Based Systems, file e398c379-5b75-179a-e053-3705fe0a4cff 16
Towards Enhancing Traffic Sign Recognition through Sliding Windows, file e398c382-43a4-179a-e053-3705fe0a4cff 16
Threat Analysis in Systems-of-Systems: An Emergence-Oriented Approach, file e398c37f-2929-179a-e053-3705fe0a4cff 15
Metodo e apparato per una segnalazione resiliente del tempo, file e398c380-bb91-179a-e053-3705fe0a4cff 15
On the Properness of Incorporating Binary Classification Machine Learning Algorithms into Safety-Critical Systems, file 7302960d-403d-4fbd-8b38-214477409a57 10
Design and Evaluation of a Safe Driver Machine Interface, file e398c378-a3aa-179a-e053-3705fe0a4cff 10
A Monitoring Framework with Integrated Sensing Technologies for Enhanced Food Safety and Traceability, file a95d59b4-66d1-478d-a655-b9ef0bd37035 6
Towards conceptual analysis of Cyber-Physical Systems projects focusing on the composition of legacy systems, file 03ffd208-09e4-48de-85ac-b14596f327bb 5
A multi-criteria ranking of security countermeasures, file e398c37a-b461-179a-e053-3705fe0a4cff 5
A requirements-driven methodology for the proper selection and configuration of blockchains, file e398c381-12bc-179a-e053-3705fe0a4cff 5
MADneSs: a Multi-layer Anomaly Detection Framework for Complex Dynamic Systems, file a43863d7-bbc0-4a33-9bda-f7ee3a176e67 4
Modelling and analysis of a scheduled maintenance system: a DSPN approach, file e398c378-cb8f-179a-e053-3705fe0a4cff 4
Modeling QoE in Dependable Tele-Immersive Applications: A Case Study of World Opera, file e398c380-f642-179a-e053-3705fe0a4cff 4
Basic concepts on Systems of Systems, file e398c37b-1d8a-179a-e053-3705fe0a4cff 2
PrivAPP: An integrated approach for the design of privacy-aware applications, file e398c37c-78a5-179a-e053-3705fe0a4cff 2
Evaluation of Anomaly Detection algorithms made easy with RELOAD, file e398c380-d0d8-179a-e053-3705fe0a4cff 2
HUSTLE: A Hardware Unit for Self-Test-Libraries Efficient Execution, file 6e3eedb2-e614-478a-8cfe-b913412c4761 1
Towards a General Model for Intrusion Detection: An Exploratory Study, file 955e0aac-7aef-405c-9ccd-a6889831735a 1
An extension of the ADVISE Meta modeling framework and its application for an early-stage security analysis of a public transport supervision system, file a76e05e6-04e1-4b64-8716-9f5f746e95d8 1
Adding Security Concerns to Safety Critical Certification, file e398c378-82aa-179a-e053-3705fe0a4cff 1
Dependability Provisions for a Network Management Platform, file e398c378-b458-179a-e053-3705fe0a4cff 1
Towards Making NekoStat a Proper Measurement Tool for the Validation of Distributed Systems, file e398c378-c038-179a-e053-3705fe0a4cff 1
Analysis of safety related architectures, file e398c378-c08f-179a-e053-3705fe0a4cff 1
A testing service for lifelong validation of dynamic SOA, file e398c378-c43b-179a-e053-3705fe0a4cff 1
Modelling and model-based assessment, file e398c378-c95b-179a-e053-3705fe0a4cff 1
Integrated Validation of Dependable Systems, file e398c378-cc0c-179a-e053-3705fe0a4cff 1
Consensus in asynchronous distributed systems, file e398c378-cc85-179a-e053-3705fe0a4cff 1
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b4-179a-e053-3705fe0a4cff 1
A Testbed for Evaluating Anomaly Detection Monitors through Fault Injection, file e398c378-f2b5-179a-e053-3705fe0a4cff 1
Experimental Validation of a Synchronization Uncertainty-Aware Software Clock, file e398c379-587b-179a-e053-3705fe0a4cff 1
Safe Estimation of Time Uncertainty of Local Clocks, file e398c379-5f02-179a-e053-3705fe0a4cff 1
An Experimental Framework for the Analysis and Validation of Software Clocks, file e398c379-5f04-179a-e053-3705fe0a4cff 1
An OS-level Framework for Anomaly Detection in Complex Software Systems, file e398c37a-09f0-179a-e053-3705fe0a4cff 1
On the impact of emergent properties on SoS security, file e398c37a-8395-179a-e053-3705fe0a4cff 1
Continuous Authentication and Non-repudiation for the Security of Critical Systems, file e398c37a-84cb-179a-e053-3705fe0a4cff 1
Experimental assessment of low-cost GPS-based localization in railway worksite-like scenarios, file e398c37a-8b3e-179a-e053-3705fe0a4cff 1
Towards an analysis framework for cost & quality estimation of V&V projects, file e398c37d-034d-179a-e053-3705fe0a4cff 1
The SISTER Approach for Verification and Validation: A Lightweight Process for Reusable Results, file e398c37e-91a0-179a-e053-3705fe0a4cff 1
Presenting the Proper Data to the Crisis Management Operator: A Relevance Labelling Strategy, file e398c381-0028-179a-e053-3705fe0a4cff 1
Detecting Intrusions by Voting Diverse Machine Learners: Is It Really Worth?, file e398c381-d02d-179a-e053-3705fe0a4cff 1
Totale 9.486
Categoria #
all - tutte 17.075
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 17.075


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019466 0 0 0 0 44 33 27 27 52 92 86 105
2019/20201.037 79 70 51 88 113 102 69 85 72 105 123 80
2020/20211.839 87 100 90 127 150 105 113 108 347 183 238 191
2021/20222.783 228 146 153 474 378 162 134 127 148 164 412 257
2022/20232.159 127 162 331 272 176 169 217 151 149 152 132 121
2023/2024796 107 135 186 178 190 0 0 0 0 0 0 0
Totale 9.486