PECCHIA, Antonio
 Distribuzione geografica
Continente #
NA - Nord America 1.361
EU - Europa 666
AS - Asia 435
AF - Africa 16
SA - Sud America 10
OC - Oceania 5
Continente sconosciuto - Info sul continente non disponibili 2
Totale 2.495
Nazione #
US - Stati Uniti d'America 1.164
CN - Cina 236
CA - Canada 197
UA - Ucraina 191
DE - Germania 153
IT - Italia 137
TR - Turchia 81
SG - Singapore 62
CZ - Repubblica Ceca 56
FI - Finlandia 30
SE - Svezia 28
IN - India 21
FR - Francia 14
GB - Regno Unito 13
HK - Hong Kong 8
TW - Taiwan 8
BE - Belgio 7
BR - Brasile 7
RU - Federazione Russa 7
NO - Norvegia 6
CI - Costa d'Avorio 5
JP - Giappone 5
AU - Australia 4
IL - Israele 4
NL - Olanda 4
PK - Pakistan 4
RO - Romania 4
AT - Austria 3
IR - Iran 3
MA - Marocco 3
CL - Cile 2
EG - Egitto 2
EU - Europa 2
HR - Croazia 2
HU - Ungheria 2
LU - Lussemburgo 2
PL - Polonia 2
SN - Senegal 2
TN - Tunisia 2
VN - Vietnam 2
ZA - Sudafrica 2
DK - Danimarca 1
EC - Ecuador 1
KR - Corea 1
LT - Lituania 1
NZ - Nuova Zelanda 1
PT - Portogallo 1
RS - Serbia 1
SK - Slovacchia (Repubblica Slovacca) 1
Totale 2.495
Città #
Jacksonville 246
Chandler 241
Toronto 191
Boardman 106
Istanbul 81
Princeton 69
Wilmington 54
Singapore 48
Bremen 44
Brno 40
Ogden 32
Shanghai 32
Helsinki 30
Guangzhou 23
Hradec Králové 15
Jiaxing 13
Shenzhen 12
Redwood City 11
Rome 11
Beijing 10
Naples 10
Wuhan 10
Xi'an 8
Los Angeles 7
Asker 6
Hanover 6
Munich 6
Nanjing 6
Norwalk 6
Venezia 6
Abidjan 5
Incourt 5
London 5
Palermo 5
Paris 5
Portland 5
Warangal 5
Afragola 4
Ashburn 4
Charlottesville 4
Delhi 4
Karachi 4
Mariglianella 4
Milan 4
Napoli 4
Xuzhou 4
Altavilla Silentina 3
Castel San Lorenzo 3
Central 3
Foshan 3
Fremont 3
Giessen 3
Jinhua 3
Mumbai 3
New York 3
Portici 3
Redmond 3
Tel Aviv 3
Tokyo 3
Vancouver 3
Wuxi 3
Alexandria 2
Amsterdam 2
Anqing 2
Aversa 2
Bangalore 2
Bath 2
Berlin 2
Bologna 2
Brisbane 2
Budapest 2
Casalnuovo di Napoli 2
Chemnitz 2
Chennai 2
Dakar 2
Dugenta 2
Elmira 2
Essen 2
Falkenstein 2
Frankfurt am Main 2
Galatina 2
Gatchina 2
Gunzenhausen 2
Hanoi 2
Houston 2
Ibipora 2
Londrina 2
Luxembourg 2
Mannheim 2
Melbourne 2
Meppel 2
Monserrato 2
Montecorvino Rovella 2
Moscow 2
Navi Mumbai 2
Osaka 2
Palma Campania 2
Pretoria 2
Quanzhou 2
Rezé 2
Totale 1.574
Nome #
A Critique on the Use of Machine Learning on Public Datasets for Intrusion Detection 64
Challenges and Directions in Security Information and Event Management (SIEM) 62
AutoLog: Anomaly detection by deep autoencoding of system logs 60
A case study on the representativeness of public DoS network traffic data for cybersecurity research 57
Advancing monitoring in microservices systems 57
An Approach for Assessing Logs by Software Fault Injection 54
An empirical analysis of error propagation in critical software systems 54
Contextual filtering and prioritization of computer application logs for security situational awareness 52
Transferability of machine learning models learned from public intrusion detection datasets: the CICIDS2017 case study 50
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data 47
Architecture-Based Criticality Assessment of Software Systems 47
Assessing and Improving the Effectiveness of Logs for the Analysis of Software Faults 46
Microservices Monitoring with Event Logs and Black Box Execution Tracing 44
Assessing Invariant Mining Techniques for Cloud-based Utility Computing Systems 44
On the Use of Event Logs for the Analysis of System Failures 44
Towards a framework for improving experiments on dos attacks 43
Towards Cognitive Security Defense from Data 43
A failure analysis of data distribution middleware in a mission-critical system for air traffic control 43
Contextual Anomaly Detection for a Critical Industrial System Based on Logs and Metrics 43
The third international workshop on reliability and security data analysis (RSDA 2016) 42
Measuring Resiliency through Field Data: Techniques, Tools and Challenges 41
Debugging-workflow-aware software reliability growth analysis 39
Discovering process models for the analysis of application failures under uncertainty of event logs 39
Assessing Direct Monitoring Techniques to Analyze Failures of Critical Industrial Systems 39
Big Data in Critical Infrastructures Security Monitoring: Challenges and Opportunities 39
Message from the RSDA 2014 workshop co-chairs 38
Assessing AUTOSAR Systems Using Fault Injection 37
Automated root cause identification of security alerts: Evaluation in a SaaS Cloud 37
A Logging Approach for Effective Dependability Evaluation of Complex Systems 36
Criticality-Driven Component Integration in Complex Software Systems 35
Measurement-Based Analysis of a DoS Defense Module for an Open Source Web Server 35
A framework for on-line timing error detection in software systems 34
A Preliminary Fault Injection Framework for Evaluating Multicore Systems 34
Characterizing Direct Monitoring Techniques in Software Systems 33
An Exploratory Study on Zeroconf Monitoring of Microservices Systems 33
Injecting Machine Check Errors to Explore Dependability Issues of Multicore Systems 32
A Method to Support Fault Tolerance Design in Service Oriented Computing Systems 31
A Deep Learning Method for Lightweight and Cross-Device IoT Botnet Detection 30
Design of a CDD-Based Fault Injection Framework for AUTOSAR Systems 30
On the Quality of Network Flow Records for IDS Evaluation: A Collaborative Filtering Approach 30
Memory Leak Analysis of Mission-Critical Middleware 28
RT-cases: Container-based virtualization for temporally separated mixed-criticality task sets 28
Logging for Dependability Evaluation 27
An experiment in memory leak analysis with a mission-critical middleware for Air Traffic Control 27
Discovering hidden errors from application log traces with process mining 27
USB-IDS-1: a Public Multilayer Dataset of Labeled Network Flows for IDS Evaluation 27
Workshop on reliability and security data analysis RSDA 2013 26
Log-Based Failure Analysis of Complex Systems: Methodology and Relevant Applications 26
Empirical Analysis and Validation of Security Alerts Filtering Techniques 25
Detection of Software Failures through Event Logs: an Experimental Study 25
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders 24
Towards a Framework for Field Data Production and Management 24
Security Log Analysis in Critical Industrial Systems Exploiting Game Theoretic Feature Selection and Evidence Combination 24
Entropy-Based Security Analytics: Measurements from a Critical Information System 24
Towards Secure Monitoring and Control Systems: Diversify! 24
Event logging in an industrial development process: Practices and reengineering challenges 24
Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding 23
Improving Log-Based Field Failure Data Analysis of Multi-Node Computing Systems 23
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study 23
Multiobjective Testing Resource Allocation under Uncertainty 23
Improving FFDA of Web Servers through a Rule-Based Logging Approach 23
NAPOLI FUTURA: Novel approaches for protecting critical infrastructures from cyber attacks 23
Simpler Is Better: On the Use of Autoencoders for Intrusion Detection 22
Guest Editors' introduction: Special issue on data-driven dependability and security 22
Filtering Security Alerts for the Analysis of a Production SaaS Cloud 21
Event Logs for the Analysis of Software Failures: A Rule-Based Approach 21
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach 21
Leveraging Fault Injection Techniques in Critical Industrial Applications 21
Detection and Security: Achieving Resiliency by Dynamic and Passive System Monitoring and Smart Access Control 21
No more DoS? An empirical study on defense techniques for web server Denial of Service mitigation 21
A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion Detection 20
Enabling Effective Dependability Evaluation of Complex Systems via a Rule-Based Logging Framework 20
On the impact of debugging on software reliability growth analysis: a case study 20
Industry Practices and Event Logging: Assessment of a Critical Software Development Process 19
On the injection of hardware faults in virtualized multicore systems 19
Machine Learning on Public Intrusion Datasets: Academic Hype or Concrete Advances in NIDS? 15
Micro2vec: Anomaly detection in microservices systems by mining numeric representations of computer logs 13
Towards realistic problem-space adversarial attacks against machine learning in network intrusion detection 10
Traditional vs Federated Learning with Deep Autoencoders: a Study in IoT Intrusion Detection 9
Exploring the effect of training-time randomness on the performance of deep neural networks for intrusion detection 9
Successful intrusion detection with a single deep autoencoder: theory and practice 8
DEFEDGE: Threat-Driven Security Testing and Proactive Defense Identification for Edge-Cloud Systems 8
Totale 2.586
Categoria #
all - tutte 22.113
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 22.113


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202068 0 0 0 0 0 0 0 0 0 0 66 2
2020/2021547 65 63 4 72 19 90 14 70 2 69 72 7
2021/2022375 11 15 204 16 8 6 5 48 36 6 18 2
2022/2023750 143 84 10 139 47 108 10 55 86 15 34 19
2023/2024412 27 64 69 22 19 6 22 12 82 14 15 60
2024/2025434 124 7 17 96 190 0 0 0 0 0 0 0
Totale 2.586