LUCCIO, Flaminia
 Distribuzione geografica
Continente #
NA - Nord America 12.930
EU - Europa 5.519
AS - Asia 3.987
SA - Sud America 364
AF - Africa 39
OC - Oceania 27
Continente sconosciuto - Info sul continente non disponibili 15
Totale 22.881
Nazione #
US - Stati Uniti d'America 12.619
CN - Cina 2.299
IT - Italia 1.844
SG - Singapore 877
UA - Ucraina 530
DE - Germania 474
PL - Polonia 468
IE - Irlanda 438
FI - Finlandia 365
SE - Svezia 360
GB - Regno Unito 348
HK - Hong Kong 329
BR - Brasile 328
CA - Canada 297
RU - Federazione Russa 209
TR - Turchia 168
AT - Austria 127
FR - Francia 116
JO - Giordania 46
IN - India 45
NL - Olanda 44
CH - Svizzera 38
DK - Danimarca 36
BE - Belgio 30
JP - Giappone 24
AU - Australia 23
ID - Indonesia 22
PH - Filippine 20
RO - Romania 20
KR - Corea 19
CZ - Repubblica Ceca 18
PK - Pakistan 17
SA - Arabia Saudita 17
VN - Vietnam 17
IR - Iran 14
UZ - Uzbekistan 14
EU - Europa 13
MY - Malesia 13
BG - Bulgaria 11
AR - Argentina 10
BD - Bangladesh 10
GR - Grecia 9
MX - Messico 9
ZA - Sudafrica 9
CL - Cile 7
IQ - Iraq 7
KE - Kenya 7
LB - Libano 7
LT - Lituania 7
ES - Italia 6
NG - Nigeria 6
EG - Egitto 5
MA - Marocco 5
SI - Slovenia 5
EC - Ecuador 4
NZ - Nuova Zelanda 4
VE - Venezuela 4
AZ - Azerbaigian 3
DZ - Algeria 3
PT - Portogallo 3
PY - Paraguay 3
TH - Thailandia 3
TN - Tunisia 3
TW - Taiwan 3
A2 - ???statistics.table.value.countryCode.A2??? 2
AE - Emirati Arabi Uniti 2
BA - Bosnia-Erzegovina 2
BO - Bolivia 2
CO - Colombia 2
GE - Georgia 2
IL - Israele 2
LU - Lussemburgo 2
NO - Norvegia 2
PE - Perù 2
UY - Uruguay 2
AN - Antille olandesi 1
CY - Cipro 1
DO - Repubblica Dominicana 1
EE - Estonia 1
GT - Guatemala 1
HN - Honduras 1
HR - Croazia 1
IS - Islanda 1
KW - Kuwait 1
KZ - Kazakistan 1
LK - Sri Lanka 1
LV - Lettonia 1
MD - Moldavia 1
ME - Montenegro 1
MN - Mongolia 1
OM - Oman 1
QA - Qatar 1
RS - Serbia 1
SV - El Salvador 1
ZW - Zimbabwe 1
Totale 22.881
Città #
Woodbridge 1.752
Fairfield 1.561
Houston 1.171
Ann Arbor 1.049
Jacksonville 981
Chandler 836
Ashburn 697
Seattle 640
Wilmington 528
Cambridge 515
Singapore 473
Dublin 438
Warsaw 412
Hong Kong 317
Venice 264
Nanjing 254
Jinan 253
Venezia 241
Boardman 232
Dearborn 227
New York 217
Beijing 202
Shenyang 180
Mestre 177
Guangzhou 163
Council Bluffs 157
Izmir 149
Boston 126
Hebei 125
Parma 122
Ottawa 116
Mülheim 108
Vienna 108
Princeton 107
Tianjin 98
Andover 90
Zhengzhou 89
Hangzhou 77
San Mateo 76
Montréal 75
Des Moines 74
Taiyuan 73
Verona 73
Changsha 72
Toronto 71
San Diego 66
Jiaxing 63
Taizhou 61
Nanchang 60
Haikou 58
Ningbo 56
The Dalles 53
Redwood City 52
Hefei 45
Fuzhou 44
Altamura 43
Milan 42
Saint Petersburg 42
San Paolo di Civitate 39
Moscow 31
Chicago 29
London 29
Udine 29
Polska 28
Munich 27
Los Angeles 26
Berlin 23
São Paulo 22
Brussels 19
Horia 18
Brooklyn 17
Orange 17
Renton 17
Turku 17
Helsinki 16
Kunming 16
Zurich 15
Kraków 14
Dong Ket 13
Stockholm 13
Tappahannock 13
Brno 12
Norwalk 12
Nuremberg 12
Perth 12
Treviso 12
Winnipeg 12
Tokyo 11
Trento 11
Xiangfen 11
Brescia 10
Copenhagen 10
Dammam 10
Hounslow 10
Naples 10
Rio de Janeiro 10
Amman 9
Ankara 9
Indiana 9
Jaipur 9
Totale 17.140
Nome #
Evaluating Security, Privacy and Usability Features of QR Code Readers 493
Usable Cryptographic QR Codes 484
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 445
Gathering of robots in a ring with mobile faults 425
Localizing Firewall Security Policies 352
Mignis: A semantic based tool for firewall configuration 347
Gathering of robots in a ring with mobile faults 333
Design and implementation of an airport chatbot 328
Mobile Agents Rendezvous in spite of a Malicious Agent. 310
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 308
Maintaining Intruder Detection Capability in a Rectangular Domain with Sensors 306
A modular approach to Sprouts 297
Accessible Tourism for Users with Hearing Loss 294
A review of Websites and Mobile Applications for People with Autism Spectrum Disorders: Towards Shared Guidelines 292
Accessible and Usable Websites and Mobile Applications for People with Autism Spectrum Disorders: a Comparative Study 292
Fast SQL Blind Injections in High Latency Networks. 285
BANANA: A tool for Boundary Ambients Nesting ANAlysis 277
Usable security for QR code 262
Compact Routing Schemes for Dynamic Ring Networks 257
Learning Sign Language from a Sanbot Robot 256
Gathering of Robots in a Grid with Mobile Faults 253
Automated Analysis of PUF-based Protocols 251
Decontamination of Hypercubes by Mobile Agents 250
Localizing Security for Distributed Firewalls 246
Analysing Sprouts 241
Tighter Bounds on Feedback Vertex Sets in Mesh-based Networks 240
Dynamic Interval Routing on Asynchronous Rings. 238
Type-Based Analysis of PIN Processing APIs 238
Complexity of Nesting Analysis in Mobile Ambients 233
On the convergence of a parallel algorithm for finding polynomial zeros 233
Type-Based Analysis of Generic Key Management APIs 233
Understanding how users choose passwords: analysis and best practices 233
Fault-Tolerant Support for Reliable Multicast in Mobile Wireless Systems: Design and Evaluation 232
An Introduction to Security API Analysis 232
Type-Based Analysis of PKCS#11 Key Management 230
FWS: Analyzing, maintaining and transcompiling firewalls 228
Compact Routing Schemes for Dynamic Ring Networks 227
A semantic based tool for firewall configuration 226
Almost Exact Minimum Feedback Vertex Set in Meshes and Butterflies 226
Sorting Multisets in Anonymous Rings 225
Distance Routing on Series Parallel Networks 224
Feedback Vertex Set in Hypercubes 219
ACM-IFIP IEEIII - Informatics Education Europe 219
Blunting Differential Attacks on PIN Processing APIs 218
A new analysis technique for the Sprouts Game 216
Guessing Bank PINs by Winning a Mastermind Game 216
Nesting analysis of mobile ambients 209
Routing in Series Parallel Networks 204
Distance Routing on Series Parallel Networks 203
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 202
A Fault-Tolerant Support for Mobile Wireless Systems, 201
On recognizing a string on an anonymous ring 199
String Recognition on Anonymous Rings 198
Usable and Accessible Tourism Websites for Children: a Case Study of a Naturalistic Oasis 198
Intruder Capture in Sierpinski Graphs. 197
Designing Tourism Websites for Children: Guidelines and Experimental Results 194
Analysis and development of Security APIs for disposable RFID tickets 193
Decontamination of Chordal Rings and Tori 190
Contiguous Search in the Hypercube for Capturing an Intruder 189
Cracking Bank PINs by Playing Mastermind 188
Boolean Routing on Chordal Rings 182
Secure upgrade of hardware security modules in bank networks 182
A Formal Model for Supporting the Adaptive Access to Virtual Museums 182
Modelling Volo, an Augmentative and Alternative Communication application 180
Visualizing Personalized Views in Virtual Museum Tours 178
A New Concept Map Model for E-learning Environments 178
Formalizing a model to represent and visualize concept spaces in e-learning environments 176
Sorting and Election in Anonymous Asynchronous Rings 175
Almost Exact Minumum Feedback Vertex Set in Meshes and Butterflies 174
Decontaminating chordal rings and tori using mobile agents. 171
Contiguous search problem in Sierpinski graphs 171
Minumum Feedback Vertex Set in k-Dimensional Hypercubes 169
String Recognition on Anonymous Rings 168
Neural-Cryptanalysis of Classical Ciphers 166
Fault-tolerant support for reliable multicast in Mobile Wireless Systems: Design and Evaluation 165
A formal description of ZigZag-structures 162
Fault-Tolerant Support for Totally Ordered Muliticast in Mobile Wireless Systems 155
A State of Art Survey on ZigZag Structures 155
Size Optimal Strategies for Capturing an Intruder in Mesh Networks 154
Towards a type-based analysis of real PKCS#11 devices 153
Fault-Tolerant Support for Reliable Multicast inMobile Wireless Systems: Design and Evaluation 152
Web accessibility recommendations for the design of tourism websites for people with autism spectrum disorders 152
Security and privacy of QR code applications: A comprehensive study, general guidelines and solutions 152
Sorting Multisets and Electing a Leader in Anonymous Rings 151
Secure recharge of disposable RFID tickets 150
Minimum Feedback Vertex Set in Pyramid and Mesh of Trees Networks 149
Capturing an Intruder in the Hypercube by Mobile Agents 147
Minimum Feedback Vertex Set in Mesh-based Networks 147
Feedback Vertex Sets in Mesh-based Networks. 138
Interval Routing in Series Parallel Graphs 137
Bridging the Gap: Automated Analysis of Sancus 136
A formally verified configuration for Hardware Security Modules in the cloud 136
Fuzzy Graphs and Error-proof Keyboards 130
Fun with Algorithms6th International Conference, FUN 2012, 129
How tasty is a cannibal? A strategy for the mesh cannibal game 128
Learning distributed algorithms by programming robots 128
Type-based Analysis of Financial APIs 127
Security and Privacy in Mobile Information and Communication SystemsThird International ICST Conference, MobiSec 2011, Aalborg, Denmark, May 17-19, 2011, Revised Selected Papers 126
The Revenge of Password Crackers: Automated Training of Password Cracking Tools 125
Mobile Agent Rendezvous When Tokens Fail 125
Totale 21.596
Categoria #
all - tutte 73.600
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 73.600


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202082 0 0 0 0 0 0 0 0 0 0 0 82
2020/20213.800 216 192 318 134 591 366 264 260 214 460 465 320
2021/20222.834 327 447 259 371 208 49 117 130 54 339 315 218
2022/20232.660 197 206 41 269 312 746 97 190 317 24 196 65
2023/20241.362 97 82 62 28 161 266 82 43 114 41 209 177
2024/20252.734 67 72 234 280 179 135 344 355 243 307 348 170
Totale 23.478