PECCHIA, Antonio
 Distribuzione geografica
Continente #
NA - Nord America 2.541
AS - Asia 1.700
EU - Europa 1.138
SA - Sud America 325
AF - Africa 63
OC - Oceania 7
Continente sconosciuto - Info sul continente non disponibili 2
AN - Antartide 1
Totale 5.777
Nazione #
US - Stati Uniti d'America 2.291
SG - Singapore 621
CN - Cina 512
DE - Germania 299
IT - Italia 263
BR - Brasile 254
CA - Canada 218
UA - Ucraina 196
TR - Turchia 101
KR - Corea 87
IN - India 72
HK - Hong Kong 71
GB - Regno Unito 69
VN - Vietnam 67
CZ - Repubblica Ceca 57
FR - Francia 54
FI - Finlandia 36
BD - Bangladesh 34
SE - Svezia 32
AR - Argentina 24
RU - Federazione Russa 24
MX - Messico 22
PK - Pakistan 22
IQ - Iraq 18
NL - Olanda 18
ZA - Sudafrica 17
BE - Belgio 13
JP - Giappone 13
PL - Polonia 13
EC - Ecuador 12
LT - Lituania 12
TW - Taiwan 12
ID - Indonesia 11
VE - Venezuela 11
AT - Austria 10
MA - Marocco 9
DZ - Algeria 7
IL - Israele 7
JO - Giordania 7
RO - Romania 7
CL - Cile 6
CO - Colombia 6
NO - Norvegia 6
AU - Australia 5
AZ - Azerbaigian 5
BO - Bolivia 5
CI - Costa d'Avorio 5
EG - Egitto 5
ES - Italia 5
KE - Kenya 5
PY - Paraguay 5
TN - Tunisia 5
AE - Emirati Arabi Uniti 4
IR - Iran 4
KZ - Kazakistan 4
PH - Filippine 4
SA - Arabia Saudita 4
LV - Lettonia 3
MY - Malesia 3
NP - Nepal 3
PT - Portogallo 3
RS - Serbia 3
UZ - Uzbekistan 3
AL - Albania 2
CR - Costa Rica 2
EU - Europa 2
HR - Croazia 2
HU - Ungheria 2
LB - Libano 2
LU - Lussemburgo 2
PA - Panama 2
PS - Palestinian Territory 2
SK - Slovacchia (Repubblica Slovacca) 2
SN - Senegal 2
AD - Andorra 1
AO - Angola 1
AQ - Antartide 1
BW - Botswana 1
BY - Bielorussia 1
BZ - Belize 1
CM - Camerun 1
DK - Danimarca 1
DO - Repubblica Dominicana 1
GA - Gabon 1
GE - Georgia 1
GF - Guiana Francese 1
GT - Guatemala 1
JM - Giamaica 1
KG - Kirghizistan 1
KI - Kiribati 1
KW - Kuwait 1
LY - Libia 1
MD - Moldavia 1
MK - Macedonia 1
MN - Mongolia 1
MZ - Mozambico 1
NZ - Nuova Zelanda 1
OM - Oman 1
PR - Porto Rico 1
RE - Reunion 1
Totale 5.772
Città #
San Jose 370
The Dalles 254
Jacksonville 246
Chandler 241
Toronto 197
Singapore 182
Ashburn 179
Boardman 107
Dallas 92
Seoul 85
Istanbul 84
Princeton 69
Falkenstein 67
Beijing 65
Hong Kong 61
Frankfurt am Main 58
Wilmington 54
Bremen 45
Brno 40
Shanghai 38
Helsinki 35
Naples 32
Ogden 32
Guangzhou 29
Los Angeles 25
São Paulo 25
London 23
Ho Chi Minh City 21
Hanoi 18
New York 18
Orem 17
Assago 16
Hradec Králové 15
Chennai 14
Munich 14
Shenzhen 14
Jiaxing 13
Rio de Janeiro 13
Santa Clara 13
Rome 12
Mexico City 11
Redwood City 11
Tokyo 11
Johannesburg 10
Wuhan 10
Dhaka 9
Mumbai 9
New Delhi 9
San Nicola Manfredi 9
Xi'an 9
Paris 8
Warsaw 8
Amman 7
Da Nang 7
Düsseldorf 7
Amsterdam 6
Asker 6
Baghdad 6
Belo Horizonte 6
Delhi 6
Hanover 6
Karachi 6
Manchester 6
Milan 6
Montreal 6
Nanjing 6
Norwalk 6
Venezia 6
Abidjan 5
Brooklyn 5
Brussels 5
Campinas 5
Foshan 5
Guayaquil 5
Houston 5
Incourt 5
Nairobi 5
Palermo 5
Portland 5
Vancouver 5
Warangal 5
Xuzhou 5
Afragola 4
Avellino 4
Aversa 4
Baku 4
Boston 4
Charlottesville 4
Council Bluffs 4
Hangzhou 4
Juiz de Fora 4
Kensington 4
Lahore 4
Manaus 4
Mariglianella 4
Napoli 4
Ottawa 4
Palma Campania 4
Piracicaba 4
Portsmouth 4
Totale 3.288
Nome #
AutoLog: Anomaly detection by deep autoencoding of system logs 145
A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection 126
A case study on the representativeness of public DoS network traffic data for cybersecurity research 113
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data 104
Challenges and Directions in Security Information and Event Management (SIEM) 101
Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study 97
MultiCIDS: Anomaly-based collective intrusion detection by deep learning on IoT/CPS multivariate time series 96
A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection 95
An empirical analysis of error propagation in critical software systems 95
Assessing and Improving the Effectiveness of Logs for the Analysis of Software Faults 94
An Approach for Assessing Logs by Software Fault Injection 94
Advancing monitoring in microservices systems 91
Architecture-Based Criticality Assessment of Software Systems 91
USB-IDS-TC: A Flow-Based Intrusion Detection Dataset of DoS Attacks in Different Network Scenarios 86
Contextual filtering and prioritization of computer application logs for security situational awareness 84
Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server 84
A failure analysis of data distribution middleware in a mission-critical system for air traffic control 83
A Preliminary Fault Injection Framework for Evaluating Multicore Systems 82
On the Use of Event Logs for the Analysis of System Failures 82
Microservices Monitoring with Event Logs and Black Box Execution Tracing 77
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics 76
Discovering process models for the analysis of application failures under uncertainty of event logs 76
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems 76
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders 75
Towards a framework for improving experiments on dos attacks 75
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 75
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 75
The third international workshop on reliability and security data analysis (RSDA 2016) 75
A framework for on-line timing error detection in software systems 73
Towards Cognitive Security Defense from Data 72
Filtering Security Alerts for the Analysis of a Production SaaS Cloud 72
On the Quality of Network Flow Records for IDS Evaluation: A Collaborative Filtering Approach 72
A Logging Approach for Effective Dependability Evaluation of Complex Systems 71
An experiment in memory leak analysis with a mission-critical middleware for Air Traffic Control 71
USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation 70
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection 69
Debugging-workflow-aware software reliability growth analysis 69
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud 69
A Method to Support Fault Tolerance Design in Service Oriented Computing Systems 69
Assessing AUTOSAR Systems Using Fault Injection 68
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities 66
Message from the RSDA 2014 workshop co-chairs 66
Design of a CDD-Based Fault Injection Framework for AUTOSAR Systems 65
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets 65
Characterizing Direct Monitoring Techniques in Software Systems 64
Measuring Resiliency through Field Data: Techniques, Tools and Challenges 64
Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection 63
Event logging in an industrial development process: Practices and reengineering challenges 63
Criticality-Driven Component Integration in Complex Software Systems 62
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding 60
Discovering hidden errors from application log traces with process mining 60
Successful intrusion detection with a single deep autoencoder: theory and practice 59
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study 59
On the impact of debugging on software reliability growth analysis: a case study 58
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS? 57
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation 57
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination 56
Event Logs for the Analysis of Software Failures: A Rule-Based Approach 56
Multiobjective Testing Resource Allocation under Uncertainty 56
Memory Leak Analysis of Mission-Critical Middleware 56
Leveraging Fault Injection Techniques in Critical Industrial Applications 56
Detection of Software Failures through Event Logs: an Experimental Study 56
Improving FFDA of Web Servers through a Rule-Based Logging Approach 55
Injecting Machine Check Errors to Explore Dependability Issues of Multicore Systems 54
Workshop on reliability and security data analysis RSDA 2013 54
Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems 54
Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications 54
Industry Practices and Event Logging: Assessment of a Critical Software Development Process 53
Simpler Is Better: On the Use of Autoencoders for Intrusion Detection 52
Empirical Analysis and Validation of Security Alerts Filtering Techniques 52
Guest Editors' introduction: Special issue on data-driven dependability and security 51
Towards a Framework for Field Data Production and Management 50
Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection 49
Logging for Dependability Evaluation 49
Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection 47
Towards Secure Monitoring and Control Systems: Diversify! 47
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems 47
Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 46
Enabling Effective Dependability Evaluation of Complex Systems via a Rule-Based Logging Framework 45
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks 45
Entropy-Based Security Analytics: Measurements from a Critical Information System 44
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs 44
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach 41
SPREADSHOT: Analysis of fake news spreading through topic modeling and bipartite weighted graphs 39
On the injection of hardware faults in virtualized multicore systems 36
A Critique on the (Mis)Use of Feature-Space Attacks for Adversarial Machine Learning in NIDS 34
Topic Modeling for Graph-Based Analysis of Fake News Diffusion 25
Detection of Adversarial Examples by Adversarial Training: A Study on the Suitability of FGSM for Hardening NIDS Against Problem-Space Attacks 23
Bipartite Graph Modeling for the Analysis of Fake News Propagation 20
Totale 5.902
Categoria #
all - tutte 41.212
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 41.212


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021148 0 0 0 0 0 0 0 0 0 69 72 7
2021/2022375 11 15 204 16 8 6 5 48 36 6 18 2
2022/2023750 143 84 10 139 47 108 10 55 86 15 34 19
2023/2024412 27 64 69 22 19 6 22 12 82 14 15 60
2024/20251.455 124 7 17 96 237 131 65 161 109 215 169 124
2025/20262.295 166 255 230 165 227 145 424 149 299 235 0 0
Totale 5.902