PECCHIA, Antonio
 Distribuzione geografica
Continente #
NA - Nord America 1.929
AS - Asia 1.300
EU - Europa 1.022
SA - Sud America 258
AF - Africa 37
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 2
AN - Antartide 1
Totale 4.555
Nazione #
US - Stati Uniti d'America 1.701
SG - Singapore 450
CN - Cina 429
DE - Germania 296
BR - Brasile 226
CA - Canada 214
IT - Italia 202
UA - Ucraina 193
TR - Turchia 91
KR - Corea 86
CZ - Repubblica Ceca 56
GB - Regno Unito 56
VN - Vietnam 52
HK - Hong Kong 50
FR - Francia 46
IN - India 37
FI - Finlandia 36
SE - Svezia 31
RU - Federazione Russa 22
BD - Bangladesh 20
AR - Argentina 12
BE - Belgio 12
JP - Giappone 12
LT - Lituania 12
PK - Pakistan 12
ZA - Sudafrica 12
AT - Austria 10
PL - Polonia 10
TW - Taiwan 10
EC - Ecuador 9
IQ - Iraq 9
MX - Messico 9
NL - Olanda 8
IL - Israele 7
MA - Marocco 7
NO - Norvegia 6
CI - Costa d'Avorio 5
ID - Indonesia 5
RO - Romania 5
AE - Emirati Arabi Uniti 4
AU - Australia 4
ES - Italia 4
IR - Iran 4
JO - Giordania 4
PY - Paraguay 4
CL - Cile 3
PT - Portogallo 3
DZ - Algeria 2
EG - Egitto 2
EU - Europa 2
HR - Croazia 2
HU - Ungheria 2
KE - Kenya 2
KZ - Kazakistan 2
LB - Libano 2
LU - Lussemburgo 2
RS - Serbia 2
SA - Arabia Saudita 2
SK - Slovacchia (Repubblica Slovacca) 2
SN - Senegal 2
TN - Tunisia 2
AD - Andorra 1
AQ - Antartide 1
AZ - Azerbaigian 1
BO - Bolivia 1
BW - Botswana 1
BZ - Belize 1
CO - Colombia 1
CR - Costa Rica 1
DK - Danimarca 1
DO - Repubblica Dominicana 1
GA - Gabon 1
GE - Georgia 1
GF - Guiana Francese 1
GT - Guatemala 1
KG - Kirghizistan 1
KI - Kiribati 1
KW - Kuwait 1
LV - Lettonia 1
MK - Macedonia 1
MN - Mongolia 1
MY - Malesia 1
NP - Nepal 1
NZ - Nuova Zelanda 1
PH - Filippine 1
PS - Palestinian Territory 1
RE - Reunion 1
SY - Repubblica araba siriana 1
TL - Timor Orientale 1
TT - Trinidad e Tobago 1
UY - Uruguay 1
UZ - Uzbekistan 1
Totale 4.555
Città #
Jacksonville 246
Chandler 241
The Dalles 201
Toronto 196
Singapore 136
Boardman 107
Dallas 92
Seoul 85
Istanbul 82
Princeton 69
Falkenstein 67
Ashburn 66
Frankfurt am Main 57
Wilmington 54
Bremen 45
Brno 40
Hong Kong 40
Beijing 39
Shanghai 36
Helsinki 35
Ogden 32
Guangzhou 26
São Paulo 25
London 23
Naples 22
Los Angeles 21
Assago 16
Ho Chi Minh City 16
New York 16
Hanoi 15
Hradec Králové 15
Munich 14
Jiaxing 13
Shenzhen 13
Rome 12
Redwood City 11
Rio de Janeiro 11
Tokyo 10
Wuhan 10
San Nicola Manfredi 9
Santa Clara 9
Xi'an 9
Johannesburg 8
Düsseldorf 7
Asker 6
Belo Horizonte 6
Dhaka 6
Hanover 6
Mumbai 6
Nanjing 6
Norwalk 6
Paris 6
Venezia 6
Abidjan 5
Amsterdam 5
Brooklyn 5
Brussels 5
Campinas 5
Da Nang 5
Delhi 5
Foshan 5
Incourt 5
Manchester 5
Montreal 5
Palermo 5
Portland 5
Vancouver 5
Warangal 5
Warsaw 5
Xuzhou 5
Afragola 4
Amman 4
Avellino 4
Aversa 4
Boston 4
Charlottesville 4
Chennai 4
Council Bluffs 4
Hangzhou 4
Houston 4
Juiz de Fora 4
Karachi 4
Manaus 4
Mariglianella 4
Milan 4
Napoli 4
Ottawa 4
Palma Campania 4
Piracicaba 4
Portsmouth 4
San Francisco 4
Seattle 4
Tel Aviv 4
Altavilla Silentina 3
Asunción 3
Baghdad 3
Biên Hòa 3
Castel San Lorenzo 3
Central 3
Charlotte 3
Totale 2.549
Nome #
AutoLog: Anomaly detection by deep autoencoding of system logs 124
A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection 106
A case study on the representativeness of public DoS network traffic data for cybersecurity research 92
Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study 82
A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection 81
An Approach for Assessing Logs by Software Fault Injection 80
An empirical analysis of error propagation in critical software systems 80
Advancing monitoring in microservices systems 80
Challenges and Directions in Security Information and Event Management (SIEM) 79
Assessing and Improving the Effectiveness of Logs for the Analysis of Software Faults 78
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data 78
Architecture-Based Criticality Assessment of Software Systems 77
Contextual filtering and prioritization of computer application logs for security situational awareness 74
On the Use of Event Logs for the Analysis of System Failures 72
A failure analysis of data distribution middleware in a mission-critical system for air traffic control 67
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics 66
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 66
Towards a framework for improving experiments on dos attacks 65
Microservices Monitoring with Event Logs and Black Box Execution Tracing 64
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems 64
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 63
Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server 63
The third international workshop on reliability and security data analysis (RSDA 2016) 63
MultiCIDS: Anomaly-based collective intrusion detection by deep learning on IoT/CPS multivariate time series 62
A framework for on-line timing error detection in software systems 62
Towards Cognitive Security Defense from Data 61
A Preliminary Fault Injection Framework for Evaluating Multicore Systems 61
Assessing AUTOSAR Systems Using Fault Injection 60
An experiment in memory leak analysis with a mission-critical middleware for Air Traffic Control 60
On the Quality of Network Flow Records for IDS Evaluation: A Collaborative Filtering Approach 60
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders 59
A Logging Approach for Effective Dependability Evaluation of Complex Systems 59
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets 59
Debugging-workflow-aware software reliability growth analysis 58
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities 57
Message from the RSDA 2014 workshop co-chairs 57
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud 56
A Method to Support Fault Tolerance Design in Service Oriented Computing Systems 55
Discovering process models for the analysis of application failures under uncertainty of event logs 54
USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation 54
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection 53
Characterizing Direct Monitoring Techniques in Software Systems 53
Measuring Resiliency through Field Data: Techniques, Tools and Challenges 53
USB-IDS-TC: A Flow-Based Intrusion Detection Dataset of DoS Attacks in Different Network Scenarios 51
Design of a CDD-Based Fault Injection Framework for AUTOSAR Systems 51
Discovering hidden errors from application log traces with process mining 51
Criticality-Driven Component Integration in Complex Software Systems 51
Event logging in an industrial development process: Practices and reengineering challenges 51
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding 50
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study 49
Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection 48
Injecting Machine Check Errors to Explore Dependability Issues of Multicore Systems 47
Workshop on reliability and security data analysis RSDA 2013 46
Filtering Security Alerts for the Analysis of a Production SaaS Cloud 46
Detection of Software Failures through Event Logs: an Experimental Study 46
On the impact of debugging on software reliability growth analysis: a case study 46
Multiobjective Testing Resource Allocation under Uncertainty 45
Logging for Dependability Evaluation 44
Memory Leak Analysis of Mission-Critical Middleware 44
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation 44
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS? 43
Improving FFDA of Web Servers through a Rule-Based Logging Approach 43
Event Logs for the Analysis of Software Failures: A Rule-Based Approach 42
Empirical Analysis and Validation of Security Alerts Filtering Techniques 42
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination 40
Simpler Is Better: On the Use of Autoencoders for Intrusion Detection 39
Successful intrusion detection with a single deep autoencoder: theory and practice 39
Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems 39
Towards Secure Monitoring and Control Systems: Diversify! 39
Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications 39
Leveraging Fault Injection Techniques in Critical Industrial Applications 39
Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection 38
Towards a Framework for Field Data Production and Management 38
Enabling Effective Dependability Evaluation of Complex Systems via a Rule-Based Logging Framework 37
Entropy-Based Security Analytics: Measurements from a Critical Information System 37
Guest Editors' introduction: Special issue on data-driven dependability and security 37
Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 37
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs 37
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems 37
Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection 36
Industry Practices and Event Logging: Assessment of a Critical Software Development Process 36
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach 34
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks 33
On the injection of hardware faults in virtualized multicore systems 32
A Critique on the (Mis)Use of Feature-Space Attacks for Adversarial Machine Learning in NIDS 13
Bipartite Graph Modeling for the Analysis of Fake News Propagation 8
Detection of Adversarial Examples by Adversarial Training: A Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks 7
Topic Modeling for Graph-Based Analysis of Fake News Diffusion 7
SPREADSHOT: Analysis of fake news spreading through topic modeling and bipartite weighted graphs 5
Totale 4.680
Categoria #
all - tutte 38.628
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 38.628


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021324 0 0 0 0 0 90 14 70 2 69 72 7
2021/2022375 11 15 204 16 8 6 5 48 36 6 18 2
2022/2023750 143 84 10 139 47 108 10 55 86 15 34 19
2023/2024412 27 64 69 22 19 6 22 12 82 14 15 60
2024/20251.455 124 7 17 96 237 131 65 161 109 215 169 124
2025/20261.073 166 255 230 165 227 30 0 0 0 0 0 0
Totale 4.680