BERLATO, STEFANO
 Distribuzione geografica
Continente #
EU - Europa 419
AS - Asia 105
NA - Nord America 36
SA - Sud America 13
AF - Africa 3
Totale 576
Nazione #
IT - Italia 391
SG - Singapore 42
US - Stati Uniti d'America 33
CN - Cina 27
VN - Vietnam 13
BR - Brasile 9
AT - Austria 8
DE - Germania 7
FR - Francia 6
BD - Bangladesh 4
HK - Hong Kong 4
JP - Giappone 3
TW - Taiwan 3
ID - Indonesia 2
MX - Messico 2
ZA - Sudafrica 2
CH - Svizzera 1
CL - Cile 1
CO - Colombia 1
CR - Costa Rica 1
EC - Ecuador 1
EG - Egitto 1
FI - Finlandia 1
GB - Regno Unito 1
IE - Irlanda 1
IN - India 1
IQ - Iraq 1
MY - Malesia 1
NP - Nepal 1
PK - Pakistan 1
PY - Paraguay 1
RO - Romania 1
RU - Federazione Russa 1
SA - Arabia Saudita 1
UA - Ucraina 1
UZ - Uzbekistan 1
Totale 576
Città #
Genoa 234
Vado Ligure 135
Singapore 14
Beijing 9
Padua 7
Santa Clara 7
San Jose 6
Frankfurt am Main 5
Ho Chi Minh City 4
Pergine Valsugana 4
New York 3
Taipei 3
Tokyo 3
Vienna 3
Villefranche-sur-Saône 3
Ashburn 2
Bordighera 2
Council Bluffs 2
Da Nang 2
Hong Kong 2
Nanjing 2
Rome 2
São Paulo 2
Verona 2
Apollo Beach 1
Arkhangelsk 1
Avaré 1
Bandung 1
Barra Mansa 1
Biên Hòa 1
Brea 1
Cairo 1
Cape Town 1
Chicago 1
Concepción 1
Coraopolis 1
Des Moines 1
Dublin 1
Durban 1
El Salto 1
Eunápolis 1
Falkenstein 1
Hanoi 1
Helsinki 1
Hopewell 1
Karachi 1
Kathmandu 1
Kuala Lumpur 1
Kyiv 1
Lauterbourg 1
London 1
Los Angeles 1
Louisville 1
Mauá 1
Medellín 1
Medina 1
Mexico City 1
Piscataway 1
Pouso Alegre 1
Quito 1
Quận Hai 1
Roncade 1
San José 1
Shanghai 1
Sorocaba 1
Tashkent 1
Thái Nguyên 1
Valparaíso de Goiás 1
Waterbury 1
Zurich 1
Totale 504
Nome #
A Security Service for Performance-Aware End-to-End Protection of Sensitive Data in Cloud Native Applications 255
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 50
Smart Card-Based Identity Management Protocols for V2V and V2I Communications in CCAM: A Systematic Literature Review 45
End-to-End Protection of IoT Communications Through Cryptographic Enforcement of Access Control Policies 44
Blockchain Based RAN Data Sharing 44
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 42
Mitigating Debugger-based Attacks to Java Applications with Self-debugging 38
Multi-Objective Microservice Orchestration: Balancing Security and Performance in CCAM 36
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 33
Totale 587
Categoria #
all - tutte 1.968
article - articoli 629
book - libri 0
conference - conferenze 724
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 3.321


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202424 0 0 0 0 5 0 1 3 0 1 7 7
2024/2025265 28 17 32 19 38 12 25 25 10 6 17 36
2025/2026298 48 19 10 17 51 22 50 13 46 22 0 0
Totale 587