PECCHIA, Antonio
 Distribuzione geografica
Continente #
NA - Nord America 1.539
EU - Europa 858
AS - Asia 642
SA - Sud America 134
AF - Africa 19
OC - Oceania 5
Continente sconosciuto - Info sul continente non disponibili 2
Totale 3.199
Nazione #
US - Stati Uniti d'America 1.333
CN - Cina 272
DE - Germania 243
CA - Canada 204
UA - Ucraina 192
SG - Singapore 183
IT - Italia 169
BR - Brasile 125
TR - Turchia 86
CZ - Repubblica Ceca 56
FI - Finlandia 35
HK - Hong Kong 29
GB - Regno Unito 28
SE - Svezia 28
FR - Francia 27
IN - India 23
RU - Federazione Russa 18
BE - Belgio 12
LT - Lituania 11
NL - Olanda 8
PK - Pakistan 8
TW - Taiwan 8
AT - Austria 6
NO - Norvegia 6
CI - Costa d'Avorio 5
EC - Ecuador 5
IL - Israele 5
JP - Giappone 5
AU - Australia 4
IQ - Iraq 4
MA - Marocco 4
RO - Romania 4
BD - Bangladesh 3
IR - Iran 3
JO - Giordania 3
CL - Cile 2
EG - Egitto 2
EU - Europa 2
HR - Croazia 2
HU - Ungheria 2
KR - Corea 2
LU - Lussemburgo 2
PL - Polonia 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
SN - Senegal 2
TN - Tunisia 2
VN - Vietnam 2
ZA - Sudafrica 2
AE - Emirati Arabi Uniti 1
BO - Bolivia 1
DK - Danimarca 1
DO - Repubblica Dominicana 1
GA - Gabon 1
ID - Indonesia 1
KE - Kenya 1
KG - Kirghizistan 1
KZ - Kazakistan 1
LV - Lettonia 1
MX - Messico 1
NP - Nepal 1
NZ - Nuova Zelanda 1
PH - Filippine 1
PT - Portogallo 1
PY - Paraguay 1
Totale 3.199
Città #
Jacksonville 246
Chandler 241
Toronto 194
The Dalles 125
Boardman 107
Istanbul 82
Singapore 82
Princeton 69
Falkenstein 66
Wilmington 54
Bremen 44
Brno 40
Shanghai 36
Helsinki 35
Ogden 32
Guangzhou 26
Hong Kong 19
Frankfurt am Main 18
Naples 18
London 16
Hradec Králové 15
Jiaxing 13
Beijing 12
Rome 12
Shenzhen 12
Redwood City 11
Wuhan 10
Los Angeles 9
San Nicola Manfredi 9
São Paulo 9
Xi'an 9
Assago 8
Düsseldorf 7
Asker 6
Hanover 6
Munich 6
Nanjing 6
Norwalk 6
Rio de Janeiro 6
Venezia 6
Abidjan 5
Amsterdam 5
Brussels 5
Foshan 5
Incourt 5
Palermo 5
Paris 5
Portland 5
Warangal 5
Xuzhou 5
Afragola 4
Ashburn 4
Aversa 4
Charlottesville 4
Council Bluffs 4
Delhi 4
Karachi 4
Mariglianella 4
Milan 4
Napoli 4
Ottawa 4
Palma Campania 4
Piracicaba 4
Portsmouth 4
Seattle 4
Tel Aviv 4
Altavilla Silentina 3
Amman 3
Belo Horizonte 3
Campinas 3
Castel San Lorenzo 3
Central 3
Chennai 3
Fremont 3
Giessen 3
Jinhua 3
Juiz de Fora 3
Londrina 3
Mumbai 3
New York 3
Portici 3
Quanzhou 3
Redmond 3
Tokyo 3
Vancouver 3
Wuxi 3
Alexandria 2
Anqing 2
Baghdad 2
Bangalore 2
Bath 2
Berlin 2
Bologna 2
Bratislava 2
Brisbane 2
Budapest 2
Casalnuovo di Napoli 2
Chemnitz 2
Contagem 2
Dakar 2
Totale 1.930
Nome #
A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection 82
AutoLog: Anomaly detection by deep autoencoding of system logs 79
Challenges and Directions in Security Information and Event Management (SIEM) 71
A case study on the representativeness of public DoS network traffic data for cybersecurity research 70
Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study 69
An empirical analysis of error propagation in critical software systems 68
Advancing monitoring in microservices systems 64
Contextual filtering and prioritization of computer application logs for security situational awareness 62
An Approach for Assessing Logs by Software Fault Injection 60
Assessing and Improving the Effectiveness of Logs for the Analysis of Software Faults 58
A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection 55
On the Use of Event Logs for the Analysis of System Failures 55
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data 55
Architecture-Based Criticality Assessment of Software Systems 54
Microservices Monitoring with Event Logs and Black Box Execution Tracing 53
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 53
Towards Cognitive Security Defense from Data 52
A failure analysis of data distribution middleware in a mission-critical system for air traffic control 51
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics 51
Towards a framework for improving experiments on dos attacks 48
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud 48
The third international workshop on reliability and security data analysis (RSDA 2016) 48
A Logging Approach for Effective Dependability Evaluation of Complex Systems 46
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems 46
Criticality-Driven Component Integration in Complex Software Systems 46
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets 46
Assessing AUTOSAR Systems Using Fault Injection 45
An experiment in memory leak analysis with a mission-critical middleware for Air Traffic Control 45
A Preliminary Fault Injection Framework for Evaluating Multicore Systems 45
Measuring Resiliency through Field Data: Techniques, Tools and Challenges 45
A framework for on-line timing error detection in software systems 44
Debugging-workflow-aware software reliability growth analysis 44
Discovering process models for the analysis of application failures under uncertainty of event logs 44
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities 44
Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server 43
Discovering hidden errors from application log traces with process mining 42
Message from the RSDA 2014 workshop co-chairs 42
Characterizing Direct Monitoring Techniques in Software Systems 40
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 40
On the Quality of Network Flow Records for IDS Evaluation: A Collaborative Filtering Approach 39
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders 38
A Method to Support Fault Tolerance Design in Service Oriented Computing Systems 38
Injecting Machine Check Errors to Explore Dependability Issues of Multicore Systems 37
Multiobjective Testing Resource Allocation under Uncertainty 37
Design of a CDD-Based Fault Injection Framework for AUTOSAR Systems 36
Memory Leak Analysis of Mission-Critical Middleware 36
USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation 36
Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications 34
Detection of Software Failures through Event Logs: an Experimental Study 34
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection 33
Logging for Dependability Evaluation 33
Workshop on reliability and security data analysis RSDA 2013 33
Empirical Analysis and Validation of Security Alerts Filtering Techniques 32
Entropy-Based Security Analytics: Measurements from a Critical Information System 32
Towards a Framework for Field Data Production and Management 31
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination 31
On the impact of debugging on software reliability growth analysis: a case study 31
Towards Secure Monitoring and Control Systems: Diversify! 30
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding 29
Simpler Is Better: On the Use of Autoencoders for Intrusion Detection 28
Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems 28
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study 28
Event Logs for the Analysis of Software Failures: A Rule-Based Approach 28
Enabling Effective Dependability Evaluation of Complex Systems via a Rule-Based Logging Framework 28
Improving FFDA of Web Servers through a Rule-Based Logging Approach 28
Guest Editors' introduction: Special issue on data-driven dependability and security 28
Event logging in an industrial development process: Practices and reengineering challenges 28
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation 28
Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection 26
Filtering Security Alerts for the Analysis of a Production SaaS Cloud 26
Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 26
Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection 25
Industry Practices and Event Logging: Assessment of a Critical Software Development Process 25
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach 25
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks 25
Leveraging Fault Injection Techniques in Critical Industrial Applications 25
Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection 24
On the injection of hardware faults in virtualized multicore systems 24
Successful intrusion detection with a single deep autoencoder: theory and practice 23
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS? 22
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs 20
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems 15
Totale 3.316
Categoria #
all - tutte 26.838
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 26.838


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202068 0 0 0 0 0 0 0 0 0 0 66 2
2020/2021547 65 63 4 72 19 90 14 70 2 69 72 7
2021/2022375 11 15 204 16 8 6 5 48 36 6 18 2
2022/2023750 143 84 10 139 47 108 10 55 86 15 34 19
2023/2024412 27 64 69 22 19 6 22 12 82 14 15 60
2024/20251.164 124 7 17 96 237 131 65 161 109 215 2 0
Totale 3.316