FALCARIN, Paolo
 Distribuzione geografica
Continente #
AS - Asia 4.477
NA - Nord America 3.974
EU - Europa 1.587
SA - Sud America 838
AF - Africa 117
OC - Oceania 31
Totale 11.024
Nazione #
US - Stati Uniti d'America 3.858
SG - Singapore 1.393
CN - Cina 863
VN - Vietnam 842
BR - Brasile 641
HK - Hong Kong 442
IE - Irlanda 349
IT - Italia 320
DE - Germania 220
JP - Giappone 175
KR - Corea 160
GB - Regno Unito 152
SE - Svezia 142
FR - Francia 130
ID - Indonesia 126
AR - Argentina 90
IN - India 86
NL - Olanda 58
CA - Canada 55
IQ - Iraq 53
BD - Bangladesh 43
PK - Pakistan 38
RU - Federazione Russa 38
EC - Ecuador 36
MX - Messico 36
YE - Yemen 34
PH - Filippine 33
FI - Finlandia 32
IR - Iran 32
TH - Thailandia 32
ZA - Sudafrica 28
PL - Polonia 27
AU - Australia 25
TW - Taiwan 25
ES - Italia 24
UA - Ucraina 23
CO - Colombia 22
TR - Turchia 21
MA - Marocco 18
NG - Nigeria 16
DZ - Algeria 15
PY - Paraguay 14
CH - Svizzera 13
MY - Malesia 13
EG - Egitto 11
CL - Cile 10
LK - Sri Lanka 10
AT - Austria 9
RO - Romania 9
JO - Giordania 7
LB - Libano 7
PE - Perù 7
TN - Tunisia 7
VE - Venezuela 7
DO - Repubblica Dominicana 6
LT - Lituania 6
PT - Portogallo 6
UZ - Uzbekistan 6
BO - Bolivia 5
ET - Etiopia 5
JM - Giamaica 5
NZ - Nuova Zelanda 5
PR - Porto Rico 5
UY - Uruguay 5
AE - Emirati Arabi Uniti 4
BG - Bulgaria 4
IL - Israele 4
NP - Nepal 4
SA - Arabia Saudita 4
UG - Uganda 4
AO - Angola 3
AZ - Azerbaigian 3
BJ - Benin 3
CZ - Repubblica Ceca 3
GR - Grecia 3
GT - Guatemala 3
HN - Honduras 3
KG - Kirghizistan 3
MD - Moldavia 3
OM - Oman 3
RS - Serbia 3
AL - Albania 2
DK - Danimarca 2
HR - Croazia 2
KE - Kenya 2
KW - Kuwait 2
LV - Lettonia 2
NI - Nicaragua 2
BE - Belgio 1
BN - Brunei Darussalam 1
CI - Costa d'Avorio 1
CR - Costa Rica 1
CV - Capo Verde 1
CY - Cipro 1
GE - Georgia 1
GY - Guiana 1
KH - Cambogia 1
KI - Kiribati 1
KZ - Kazakistan 1
LY - Libia 1
Totale 11.014
Città #
Woodbridge 803
Singapore 616
Ashburn 550
Hong Kong 418
San Jose 384
Dublin 349
Ho Chi Minh City 242
Dallas 207
Hanoi 185
Fairfield 180
Wilmington 170
New York 151
Tokyo 147
Boardman 123
Seoul 121
Beijing 111
Boston 110
Council Bluffs 102
Mülheim 94
Princeton 93
Los Angeles 86
Lauterbourg 83
São Paulo 68
Jakarta 65
Cambridge 53
Venice 53
Guangzhou 52
Da Nang 49
Haiphong 47
Altamura 45
San Diego 42
Hangzhou 39
Buffalo 37
Frankfurt am Main 37
Munich 36
Santa Clara 36
Seattle 36
Sanaa 34
Houston 32
Chicago 30
London 30
San Mateo 27
Andover 25
Nanjing 25
Toronto 24
Warsaw 24
Hebei 23
Orem 23
Baghdad 22
San Paolo di Civitate 20
Zhengzhou 20
Rio de Janeiro 19
Treviso 19
Ann Arbor 18
Guayaquil 18
Helsinki 18
Redondo Beach 18
Shenyang 18
Milan 17
Camden 16
Hải Dương 16
Ningbo 16
Atlanta 15
Hefei 15
Curitiba 14
Jinan 14
Melbourne 14
Montreal 14
Shanghai 14
Tehran 14
Tianjin 14
Brooklyn 13
Johannesburg 13
Stockholm 13
Taizhou 13
Amsterdam 12
Belo Horizonte 12
Brasília 12
Kagoya 12
Karachi 12
Biên Hòa 11
Changsha 11
Colombo 11
Haikou 11
Quezon City 11
Rome 11
Thái Bình 11
Amstelveen 10
Bengaluru 10
Poplar 10
Asunción 9
Can Tho 9
Fuzhou 9
Maceió 9
Nanchang 9
Norwalk 9
Thái Nguyên 9
Turku 9
Zurich 9
Bangkok 8
Totale 7.008
Nome #
Enhancement performance of random forest algorithm via one hot encoding for IoT IDS 740
Code renewability for native software protection 191
Building a Cybersecurity Knowledge Graph with CyberGraph 181
A large study on the effect of code obfuscation on the quality of java code 168
A meta-model for software protections and reverse engineering attacks 166
Service Creation in the SPICE Service Platform 164
Software Systems Compliance with the AI Act: Lessons Learned from an International Challenge 163
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge 161
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques 157
Data Quality Challenges in Large-Scale Cyber-Physical Systems: a Systematic Review 155
Software Protection 154
Rule-based monitoring and error detecting for converged telecommunication processes 153
Time-series clustering for sensor fault detection in large-scale Cyber-Physical Systems 152
gLCB: An Energy Aware Context Broker 151
A visual semantic service browser supporting user-centric service composition 148
Energy optimization in wireless sensor networks based on genetic algorithms 144
A Model for the Proteolytic Regulation of LPXC in the Lipopolysaccharide Pathway of Escherichia Coli 140
Exploiting code mobility for dynamic binary obfuscation 140
A Reference Architecture for Software Protection 140
Analysis of Obfuscated Code with Program Slicing 135
Search Based Clustering for Protecting Software with Diversified Updates 132
How Professional Hackers Understand Protected Code while Performing Attack Tasks 130
Dynamic context-aware business process: a rule-based approach supported by pattern identification 130
Automated context aware composition of Advanced Telecom Services for environmental early warnings 129
Legal Requirements Compliance using NLP and Knowledge Graphs 128
An Open Source Software Architecture for Smart Buildings 128
IoT Intrusion Detection Using Modified Random Forest Based on Double Feature Selection Methods 128
Software Protection with Code Mobility 127
A Recommender System for Telecom Users: Experimental Evaluation of Recommendation Algorithms 126
A Dynamic Analysis Tool for Extracting UML 2 Sequence Diagrams 123
HAUTO: Automated composition of convergent services based in HTN planning 122
Measuring Security Requirements for Software Security 120
A Web-Based Application to Verify Open Mobile Alliance Device Management Specifications 119
Attack simulation based software protection assessment method 119
An automated user-centered planning framework for decision support in environmental early warnings 115
A User-centric Mobile Service Creation Approach Converging Telco and IT Services 114
Towards automated composition of convergent services: a survey 114
XDM-Compatible Service Repository for User-Centric Service Creation and Discovery 109
Emergency situations supported by Context-Aware and application streaming technologies 108
Software Architecture Evolution through Dynamic AOP 107
A Model-driven Framework for Professional Service Designers and Developers 107
HADES: a Hybrid Anomaly Detection System for Large-Scale Cyber-Physical Systems 107
An Approach to Domain-Specific Reuse in Service-Oriented Environments 107
Broadening JAIN-SLEE with a Service Description Language and Asynchronous Web Services 106
An architecture for self-reconfiguration of convergent telecom processes 106
Remote Trust with Aspect-Oriented Programming 104
Towards Experimental Evaluation of Code Obfuscation Techniques 103
Weaving Business Processes and Rules: a Petri Net Approach 103
Automated context aware composition for convergent services 103
A CPL to Java compiler for dynamic service personalization in JAIN-SIP server 102
Content discovery advertisements: An explorative analysis 100
Application-oriented trust in distributed computing 99
Model Driven Service Creation for IT-Telecom Services 98
The Effectiveness of Source Code Obfuscation: an Experimental Assessment 98
SITUATION INFERENCE FOR MOBILE USERS: A RULE BASED APPROACH 98
Designing the Parlay Call-control using ASMs 96
A User-Centric Service Creation Approach for Next Generation Networks 96
Context Data Management: an Architectural Framework for Context-Aware Services 95
Automated Reasoning on Aspects Interactions 95
Dynamic architectural changes for distributed services 94
Communication Web Services Composition and Integration 94
First International Workshop on Telecom Service Oriented Architectures(TSOA-07) (Introduction). In Service-OrientedComputing - ICSOC 2007 WorkshopsVienna, Austria, September 17, 2007 93
Integrity Checking in Remote Computation 92
Automatic Scenario Model Extraction with AOP 91
Service composition quality evaluation in SPICE platform 91
Call Control Component implementing converged Telephony-Internet networks 90
Code Defactoring: Evaluating the Effectiveness of Java Obfuscations 90
Service Discovery Suite for User-Centric Service Creation 90
Software Tampering Detection using AOP and mobile code 89
An Aspect-Oriented Approach for Dynamic Monitoring of a Service Logic Execution Environment 88
Analysis of NGN service creation Technologies 88
Towards the Automation of the Service Composition Process: Case Study and Prototype Implementations 88
Towards a Telecommunication Service Oriented Architecture 85
Communication Web Services and JAIN-SLEE Integration Challenges 85
Service opportunities for Next Generation Networks 83
Synthesizing Service Composition Models on the Basis of Temporal Business Rules 82
Leveraging Context-Awareness for Personalization in a User Generated Services Platform 81
Service Creation Environment for Mobile and Mobile Broadcast Services 80
Asynchronous Interactions for Communication Web Services 80
USING TEMPORAL BUSINESS RULES TO SYNTHESIZE SERVICE COMPOSITION PROCESS MODELS 80
Natural language processing based Services Composition for Environmental management 78
Next Generation Networks: the service offering standpoint 77
Service Composition Quality Evaluation in SPICE Platform 76
Towards an Efficient Context-Aware System: Problems and Suggestions to Reduce Energy Consumption in Mobile Devices 74
Next Generation Networks: the service offering standpoint 73
The ASPIRE framework for software protection 73
Integrating User-Generated Content and Pervasive Communications 71
Realizing an MDA and SOA Marriage for the Development of Mobile Services 71
User Centred Automated Composition in Telco 2.0 71
Service creation guidelines in Next Generation Networks 70
Personalized Service Creation and Provision forthe Mobile Web 69
User-Centric Future Internet and Telecommunication Services 66
Leveraging Context for Social Media Mobile Services (in IEEE PERVASIVE COMPUTING - Work in progress Section) 66
User-Centric Future Internet and Telecommunication Services 65
UML Requirements for Distributed Software Architectures 65
INTRODUCING THE USER TO THE SERVICE CREATION WORLD: CONCEPTS FOR USER CENTRIC SERVICE CREATION, PERSONALIZATION AND NOTIFICATION 64
Developing Secure Software and Systems 63
Detection of Reverse Engineering Activities Before the Attack 59
Totale 11.139
Categoria #
all - tutte 53.124
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 53.124


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2021/20222.055 0 0 239 281 251 29 9 51 64 178 769 184
2022/2023836 172 70 6 0 32 405 2 2 12 10 103 22
2023/2024771 12 6 16 3 39 122 112 39 192 10 97 123
2024/20251.804 10 21 104 71 232 106 106 169 208 325 278 174
2025/20265.673 332 360 613 997 552 461 604 366 979 409 0 0
Totale 11.139