LUCCIO, Flaminia
 Distribuzione geografica
Continente #
NA - Nord America 16.098
AS - Asia 8.548
EU - Europa 6.302
SA - Sud America 641
AF - Africa 176
OC - Oceania 40
Continente sconosciuto - Info sul continente non disponibili 15
Totale 31.820
Nazione #
US - Stati Uniti d'America 15.690
CN - Cina 3.199
SG - Singapore 2.601
IT - Italia 2.084
VN - Vietnam 771
DE - Germania 565
UA - Ucraina 537
BR - Brasile 510
PL - Polonia 505
HK - Hong Kong 454
IE - Irlanda 448
GB - Regno Unito 441
FI - Finlandia 381
SE - Svezia 377
CA - Canada 346
JP - Giappone 297
IN - India 267
KR - Corea 260
FR - Francia 247
RU - Federazione Russa 221
TR - Turchia 174
AT - Austria 152
NL - Olanda 67
PH - Filippine 61
BD - Bangladesh 59
JO - Giordania 54
ID - Indonesia 49
MA - Marocco 49
IQ - Iraq 46
PK - Pakistan 41
AR - Argentina 40
CH - Svizzera 40
BE - Belgio 39
ZA - Sudafrica 37
DK - Danimarca 36
MY - Malesia 35
AU - Australia 33
MX - Messico 31
SA - Arabia Saudita 30
ES - Italia 27
TH - Thailandia 26
RO - Romania 24
CZ - Repubblica Ceca 22
UZ - Uzbekistan 21
LT - Lituania 20
VE - Venezuela 19
CL - Cile 17
IR - Iran 16
TW - Taiwan 15
CO - Colombia 14
EC - Ecuador 14
KE - Kenya 14
BJ - Benin 13
EU - Europa 13
GR - Grecia 13
BG - Bulgaria 12
EG - Egitto 12
DZ - Algeria 11
LB - Libano 11
NG - Nigeria 9
PY - Paraguay 8
UY - Uruguay 8
AE - Emirati Arabi Uniti 7
PT - Portogallo 7
SI - Slovenia 7
TN - Tunisia 7
ET - Etiopia 6
NO - Norvegia 6
AZ - Azerbaigian 5
BO - Bolivia 5
DO - Repubblica Dominicana 5
GE - Georgia 5
JM - Giamaica 5
NP - Nepal 5
NZ - Nuova Zelanda 5
OM - Oman 5
PE - Perù 5
QA - Qatar 5
BA - Bosnia-Erzegovina 4
HN - Honduras 4
IL - Israele 4
KZ - Kazakistan 4
LU - Lussemburgo 4
PS - Palestinian Territory 4
CR - Costa Rica 3
LK - Sri Lanka 3
ML - Mali 3
MM - Myanmar 3
PA - Panama 3
SN - Senegal 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AO - Angola 2
BH - Bahrain 2
BY - Bielorussia 2
CY - Cipro 2
EE - Estonia 2
GD - Grenada 2
GT - Guatemala 2
IS - Islanda 2
KW - Kuwait 2
Totale 31.785
Città #
Woodbridge 1.752
Ashburn 1.631
Fairfield 1.561
Singapore 1.506
Houston 1.178
Ann Arbor 1.049
Jacksonville 984
Chandler 836
San Jose 809
Seattle 644
Wilmington 529
Cambridge 515
Dublin 446
Warsaw 432
Hong Kong 424
Dallas 405
Beijing 307
Venice 297
New York 279
Jinan 256
Nanjing 255
Hefei 248
Venezia 241
Seoul 235
Boardman 234
Dearborn 227
Ho Chi Minh City 218
Guangzhou 211
Hanoi 194
Council Bluffs 186
Shenyang 184
Tokyo 184
Mestre 178
Izmir 149
Parma 139
Bengaluru 137
Boston 136
Hebei 125
Vienna 120
Ottawa 118
Los Angeles 112
Mülheim 108
Princeton 108
Lauterbourg 103
Tianjin 102
Zhengzhou 96
Andover 90
Des Moines 89
Buffalo 84
Hangzhou 83
The Dalles 82
Changsha 78
Santa Clara 77
San Mateo 76
Taiyuan 76
Montréal 75
Toronto 75
Verona 74
San Diego 67
Jiaxing 63
Taizhou 63
Udine 63
Nanchang 60
Haikou 58
Milan 58
Ningbo 58
São Paulo 55
Chicago 53
Redwood City 52
Frankfurt am Main 48
Fuzhou 46
Altamura 43
Saint Petersburg 42
Casablanca 41
Da Nang 40
Munich 40
San Paolo di Civitate 39
London 38
Montreal 34
Orem 33
Moscow 31
Naples 30
Chennai 29
Bovolone 28
Polska 28
Brooklyn 27
Columbus 26
Haiphong 26
Berlin 25
Johannesburg 25
Stockholm 24
Helsinki 23
Nuremberg 22
Turku 22
Amsterdam 20
Brussels 20
Phoenix 19
Baghdad 18
Horia 18
Rome 18
Totale 22.720
Nome #
Evaluating Security, Privacy and Usability Features of QR Code Readers 576
Usable Cryptographic QR Codes 559
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 516
Gathering of robots in a ring with mobile faults 482
Understanding how users choose passwords: analysis and best practices 444
Mignis: A semantic based tool for firewall configuration 435
Localizing Firewall Security Policies 424
Gathering of robots in a ring with mobile faults 405
Design and implementation of an airport chatbot 396
A modular approach to Sprouts 391
Usable security for QR code 388
Accessible and Usable Websites and Mobile Applications for People with Autism Spectrum Disorders: a Comparative Study 387
Mobile Agents Rendezvous in spite of a Malicious Agent. 386
Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors 384
Accessible Tourism for Users with Hearing Loss 380
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 369
A review of Websites and Mobile Applications for People with Autism Spectrum Disorders: Towards Shared Guidelines 357
Fast SQL Blind Injections in High Latency Networks. 348
An Introduction to Security API Analysis 341
Analysing Sprouts 327
A semantic based tool for firewall configuration 323
Decontamination of Hypercubes by Mobile Agents 321
BANANA: A tool for Boundary Ambients Nesting ANAlysis 319
Automated Analysis of PUF-based Protocols 315
Learning Sign Language from a Sanbot Robot 314
Gathering of Robots in a Grid with Mobile Faults 307
Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems: Design and Evaluation 306
FWS: Analyzing, maintaining and transcompiling firewalls 305
Type-Based Analysis of PKCS#11 Key Management 304
Compact Routing Schemes for Dynamic Ring Networks 301
Almost Exact Minimum Feedback Vertex Set in Meshes and Butterflies 300
On the convergence of a parallel algorithm for finding polynomial zeros 294
Localizing Security for Distributed Firewalls 294
Dynamic Interval Routing on Asynchronous Rings. 292
ACM-IFIP IEEIII - Informatics Education Europe 292
A new analysis technique for the Sprouts Game 291
A Fault-Tolerant Support for Mobile Wireless Systems, 290
Tighter Bounds on Feedback Vertex Sets in Mesh-based Networks 289
Sorting Multisets in Anonymous Rings 285
Distance Routing on Series Parallel Networks 285
Complexity of Nesting Analysis in Mobile Ambients 284
Guessing Bank PINs by Winning a Mastermind Game 284
Type-Based Analysis of PIN Processing APIs 279
Type-Based Analysis of Generic Key Management APIs 278
Feedback Vertex Set in Hypercubes 277
Compact Routing Schemes for Dynamic Ring Networks 275
A Formal Model for Supporting the Adaptive Access to Virtual Museums 273
Analysis and development of Security APIs for disposable RFID tickets 272
Distance Routing on Series Parallel Networks 269
A New Concept Map Model for E-learning Environments 263
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 263
Nesting analysis of mobile ambients 259
Decontamination of Chordal Rings and Tori 259
Blunting Differential Attacks on PIN Processing APIs 258
On recognizing a string on an anonymous ring 257
A formally verified configuration for Hardware Security Modules in the cloud 255
Routing in Series Parallel Networks 252
Intruder Capture in Sierpinski Graphs. 250
A State of Art Survey on ZigZag Structures 249
String Recognition on Anonymous Rings 244
A formal description of ZigZag-structures 242
Designing Tourism Websites for Children: Guidelines and Experimental Results 240
Secure upgrade of hardware security modules in bank networks 239
Contiguous Search in the Hypercube for Capturing an Intruder 239
Modelling Volo, an Augmentative and Alternative Communication application 237
Minumum Feedback Vertex Set in k-Dimensional Hypercubes 237
Cracking Bank PINs by Playing Mastermind 236
Bridging the Gap: Automated Analysis of Sancus 235
Decontaminating chordal rings and tori using mobile agents. 235
Usable and Accessible Tourism Websites for Children: a Case Study of a Naturalistic Oasis 234
Visualizing Personalized Views in Virtual Museum Tours 230
Boolean Routing on Chordal Rings 228
Contiguous search problem in Sierpinski graphs 226
Web accessibility recommendations for the design of tourism websites for people with autism spectrum disorders 226
String Recognition on Anonymous Rings 224
Formalizing a model to represent and visualize concept spaces in e-learning environments 223
A New Actor-Based Structure for Distributed Systems 223
The Revenge of Password Crackers: Automated Training of Password Cracking Tools 220
A Fast and Cost-effective Design for FPGA-based Fuzzy Rainbow Tradeoffs 220
Almost Exact Minumum Feedback Vertex Set in Meshes and Butterflies 219
Neural-Cryptanalysis of Classical Ciphers 218
Fault-Tolerant Support for Totally Ordered Muliticast in Mobile Wireless Systems 217
Sorting and Election in Anonymous Asynchronous Rings 215
Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation 211
A Recipe for Cost-Effective Secure IoT: the SAFE PLACE Project Case Study 209
Towards a type-based analysis of real PKCS#11 devices 209
Firmware Extraction from Real IoT Devices through Power Analysis of AES 208
Fault-Tolerant Support for Reliable Multicast inMobile Wireless Systems: Design and Evaluation 207
Size Optimal Strategies for Capturing an Intruder in Mesh Networks 205
Security and privacy of QR code applications: A comprehensive study, general guidelines and solutions 202
Sorting Multisets and Electing a Leader in Anonymous Rings 199
Secure recharge of disposable RFID tickets 197
Capturing an Intruder in the Hypercube by Mobile Agents 196
2IN1: A Bimodal Behavioral Biometric-based User Authentication Scheme for Smartphones 194
Minimum Feedback Vertex Set in Mesh-based Networks 194
Fuzzy Graphs and Error-proof Keyboards 191
Feedback Vertex Sets in Mesh-based Networks. 190
Minimum Feedback Vertex Set in Pyramid and Mesh of Trees Networks 189
How tasty is a cannibal? A strategy for the mesh cannibal game 182
Fun with Algorithms6th International Conference, FUN 2012, 180
Totale 28.248
Categoria #
all - tutte 94.297
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 94.297


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021785 0 0 0 0 0 0 0 0 0 0 465 320
2021/20222.834 327 447 259 371 208 49 117 130 54 339 315 218
2022/20232.660 197 206 41 269 312 746 97 190 317 24 196 65
2023/20241.362 97 82 62 28 161 266 82 43 114 41 209 177
2024/20252.828 67 72 234 280 179 135 344 355 243 307 348 264
2025/20268.856 602 582 866 725 1.003 834 1.044 627 1.217 1.184 172 0
Totale 32.428