PECCHIA, Antonio
 Distribuzione geografica
Continente #
NA - Nord America 1.242
EU - Europa 583
AS - Asia 141
AF - Africa 14
SA - Sud America 8
Continente sconosciuto - Info sul continente non disponibili 2
OC - Oceania 2
Totale 1.992
Nazione #
US - Stati Uniti d'America 1.045
CA - Canada 197
UA - Ucraina 190
DE - Germania 139
IT - Italia 125
TR - Turchia 71
SE - Svezia 28
FI - Finlandia 26
IN - India 19
CZ - Repubblica Ceca 16
CN - Cina 15
GB - Regno Unito 12
FR - Francia 11
HK - Hong Kong 8
RU - Federazione Russa 7
BE - Belgio 6
NO - Norvegia 6
TW - Taiwan 6
BR - Brasile 5
CI - Costa d'Avorio 5
JP - Giappone 5
SG - Singapore 5
IL - Israele 4
PK - Pakistan 4
RO - Romania 4
IR - Iran 3
MA - Marocco 3
AT - Austria 2
AU - Australia 2
CL - Cile 2
EG - Egitto 2
EU - Europa 2
LU - Lussemburgo 2
NL - Olanda 2
PL - Polonia 2
SN - Senegal 2
TN - Tunisia 2
DK - Danimarca 1
EC - Ecuador 1
HR - Croazia 1
HU - Ungheria 1
KR - Corea 1
PT - Portogallo 1
RS - Serbia 1
Totale 1.992
Città #
Jacksonville 246
Chandler 241
Toronto 191
Istanbul 71
Princeton 69
Wilmington 54
Bremen 44
Ogden 32
Helsinki 26
Hradec Králové 15
Redwood City 11
Rome 11
Naples 10
Los Angeles 7
Asker 6
Hanover 6
Norwalk 6
Venezia 6
Abidjan 5
Incourt 5
London 5
Nanjing 5
Palermo 5
Paris 5
Portland 5
Warangal 5
Afragola 4
Charlottesville 4
Delhi 4
Karachi 4
Mariglianella 4
Napoli 4
Wuhan 4
Altavilla Silentina 3
Castel San Lorenzo 3
Central 3
Fremont 3
Giessen 3
Mumbai 3
New York 3
Portici 3
Redmond 3
Tel Aviv 3
Tokyo 3
Vancouver 3
Alexandria 2
Bangalore 2
Bath 2
Berlin 2
Bologna 2
Brisbane 2
Casalnuovo di Napoli 2
Chemnitz 2
Chennai 2
Dakar 2
Dugenta 2
Elmira 2
Essen 2
Falkenstein 2
Galatina 2
Gatchina 2
Gunzenhausen 2
Houston 2
Ibipora 2
Luxembourg 2
Mannheim 2
Meppel 2
Milan 2
Monserrato 2
Montecorvino Rovella 2
Moscow 2
Navi Mumbai 2
Osaka 2
Rezé 2
Saarbrücken 2
Santiago 2
Shanghai 2
Shenzhen 2
Taipei 2
Tehran 2
Terzigno 2
Alcamo 1
Altavilla Irpina 1
Amityville 1
Andover 1
Antrodoco 1
Ardabil 1
Ardea 1
Arzano 1
Baden 1
Benevento 1
Berezniki 1
Biberach an der Riss 1
Bonn 1
Boydton 1
Bremerhaven 1
Brno 1
Bruehl 1
Budapest 1
Buffalo 1
Totale 1.247
Nome #
Challenges and Directions in Security Information and Event Management (SIEM) 58
A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection 52
Advancing monitoring in microservices systems 49
Contextual filtering and prioritization of computer application logs for security situational awareness 47
A case study on the representativeness of public DoS network traffic data for cybersecurity research 47
Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study 45
An empirical analysis of error propagation in critical software systems 44
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data 43
Assessing and Improving the Effectiveness of Logs for the Analysis of Software Faults 42
An Approach for Assessing Logs by Software Fault Injection 42
Towards a framework for improving experiments on dos attacks 41
AutoLog: Anomaly detection by deep autoencoding of system logs 40
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics 38
Microservices Monitoring with Event Logs and Black Box Execution Tracing 38
The third international workshop on reliability and security data analysis (RSDA 2016) 38
Towards Cognitive Security Defense from Data 37
On the Use of Event Logs for the Analysis of System Failures 36
Measuring Resiliency through Field Data: Techniques, Tools and Challenges 35
Architecture-Based Criticality Assessment of Software Systems 35
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 34
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud 34
Debugging-workflow-aware software reliability growth analysis 32
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities 32
Message from the RSDA 2014 workshop co-chairs 32
Assessing AUTOSAR Systems Using Fault Injection 31
Discovering process models for the analysis of application failures under uncertainty of event logs 31
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems 31
Criticality-Driven Component Integration in Complex Software Systems 30
Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server 30
A failure analysis of data distribution middleware in a mission-critical system for air traffic control 29
Characterizing Direct Monitoring Techniques in Software Systems 29
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 28
A Preliminary Fault Injection Framework for Evaluating Multicore Systems 28
A Logging Approach for Effective Dependability Evaluation of Complex Systems 26
Injecting Machine Check Errors to Explore Dependability Issues of Multicore Systems 25
Design of a CDD-Based Fault Injection Framework for AUTOSAR Systems 25
A framework for on-line timing error detection in software systems 25
USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation 24
On the Quality of Network Flow Records for IDS Evaluation: A Collaborative Filtering Approach 24
A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection 23
A Method to Support Fault Tolerance Design in Service Oriented Computing Systems 23
Discovering hidden errors from application log traces with process mining 22
Detection of Software Failures through Event Logs: an Experimental Study 22
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets 22
Workshop on reliability and security data analysis RSDA 2013 21
An experiment in memory leak analysis with a mission-critical middleware for Air Traffic Control 21
Entropy-Based Security Analytics: Measurements from a Critical Information System 21
Logging for Dependability Evaluation 20
Towards a Framework for Field Data Production and Management 20
Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems 20
Empirical Analysis and Validation of Security Alerts Filtering Techniques 20
Memory Leak Analysis of Mission-Critical Middleware 20
Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications 20
Multiobjective Testing Resource Allocation under Uncertainty 19
Towards Secure Monitoring and Control Systems: Diversify! 19
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks 19
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination 18
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study 18
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding 17
Filtering Security Alerts for the Analysis of a Production SaaS Cloud 17
Event Logs for the Analysis of Software Failures: A Rule-Based Approach 17
Improving FFDA of Web Servers through a Rule-Based Logging Approach 17
Guest Editors' introduction: Special issue on data-driven dependability and security 17
Leveraging Fault Injection Techniques in Critical Industrial Applications 17
Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 17
Event logging in an industrial development process: Practices and reengineering challenges 17
On the impact of debugging on software reliability growth analysis: a case study 17
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation 17
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders 16
Enabling Effective Dependability Evaluation of Complex Systems via a Rule-Based Logging Framework 16
Industry Practices and Event Logging: Assessment of a Critical Software Development Process 16
On the injection of hardware faults in virtualized multicore systems 16
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach 16
Simpler Is Better: On the Use of Autoencoders for Intrusion Detection 15
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection 11
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs 11
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS? 10
Successful intrusion detection with a single deep autoencoder: theory and practice 5
Totale 2.077
Categoria #
all - tutte 16.242
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 16.242


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202068 0 0 0 0 0 0 0 0 0 0 66 2
2020/2021547 65 63 4 72 19 90 14 70 2 69 72 7
2021/2022375 11 15 204 16 8 6 5 48 36 6 18 2
2022/2023750 143 84 10 139 47 108 10 55 86 15 34 19
2023/2024337 27 64 69 22 19 6 22 12 82 14 0 0
Totale 2.077