NOCERA, ANTONINO
 Distribuzione geografica
Continente #
NA - Nord America 1.276
EU - Europa 599
AS - Asia 430
AF - Africa 11
Continente sconosciuto - Info sul continente non disponibili 2
Totale 2.318
Nazione #
US - Stati Uniti d'America 1.258
IE - Irlanda 366
CN - Cina 326
SG - Singapore 83
IT - Italia 82
DE - Germania 48
FI - Finlandia 44
SE - Svezia 26
CA - Canada 18
BE - Belgio 14
MU - Mauritius 9
HK - Hong Kong 6
FR - Francia 4
JP - Giappone 4
UA - Ucraina 4
GB - Regno Unito 3
TW - Taiwan 3
CH - Svizzera 2
ES - Italia 2
EU - Europa 2
GE - Georgia 2
IN - India 2
AE - Emirati Arabi Uniti 1
AT - Austria 1
AZ - Azerbaigian 1
CZ - Repubblica Ceca 1
IR - Iran 1
KR - Corea 1
MA - Marocco 1
NL - Olanda 1
RU - Federazione Russa 1
TZ - Tanzania 1
Totale 2.318
Città #
Dublin 366
Chandler 319
Ashburn 119
Boardman 117
Lawrence 74
Medford 74
Princeton 74
Beijing 73
Nanjing 66
Singapore 61
Wilmington 45
Helsinki 44
Nanchang 34
Ann Arbor 31
Changsha 22
Shanghai 22
Shenyang 20
Hebei 19
Jiaxing 19
Milan 17
Falkenstein 15
Brussels 14
Hangzhou 12
Washington 11
Frankfurt am Main 10
Norwalk 10
Tianjin 10
Toronto 10
Dallas 9
Seattle 9
Ottawa 7
New York 6
Buffalo 5
Chicago 5
Munich 5
Pogliano Milanese 5
Redwood City 5
Jinan 4
Pavia 4
Turin 4
Aversa 3
Guangzhou 3
Los Angeles 3
Sondrio 3
Tainan City 3
Woodbridge 3
Alessandria 2
Athens 2
Bamberg 2
Borås 2
Catania 2
Central 2
Clifton 2
Columbus 2
Corsico 2
Fairfield 2
Florence 2
Fratta Polesine 2
Hong Kong 2
Lodi 2
Parabiago 2
Rockville 2
San Jose 2
Sesto San Giovanni 2
Shenzhen 2
Tbilisi 2
Tokyo 2
Varese 2
Amsterdam 1
Annapolis 1
Ardabil 1
Baku 1
Baotou 1
Bengaluru 1
Berlin 1
Boiling Springs 1
Brescia 1
Brno 1
Champaign 1
Changzhou 1
Cordenons 1
Council Bluffs 1
Detmold 1
Fayetteville 1
Floral Park 1
Forest City 1
Jining 1
Kunming 1
Lanzhou 1
Lariano 1
London 1
Lu'an 1
Napoli 1
Nole 1
Orange 1
Osaka 1
Paderborn 1
Paterna 1
Quanzhou 1
Riposto 1
Totale 1.870
Nome #
A Privacy-Preserving Localization Service for Assisted Living Facilities 51
Defining and detecting k-bridges in a social network: The Yelp case, and more 50
Discovering Missing Me Edges across Social Networks 48
A Component-based Framework for the Integration and Exploration of XML Sources 48
A Clustering-based Analysis of a Social Internetworking Scenario 46
H2O: Secure Interactions in IoT via Behavioral Fingerprinting 46
An approach to providing a user of a “social folksonomy” with recommendations of similar users and potentially interesting resources 45
A conceptual framework for community detection, characterization and membership in a Social Internetworking scenario 44
A model to support design and development of multiple-social-network applications 43
An approach to deriving a virtual thematic folksonomy based system from a social inter-folksonomy based scenario 43
A comparative study of the definitions of intradialytic hypotension correlated with increased mortality to identify universal predictors 42
Comparing Twitter and Facebook user behavior: Privacy and other aspects 42
PHIS: a system for scouting potential hubs and for favoring their "growth" in a Social Internetworking Scenario 41
Social Interactions or Business Transactions? What Customer Reviews Disclose about Airbnb Marketplace 41
A New Form of Assortativity in Online Social Networks 40
A privacy-preserving approach to prevent feature disclosure in an IoT scenario 40
Building topic-driven virtual IoTs in a Multiple IoTs scenario 40
Bridge Analysis in a Social Internetworking Scenario 39
A two-tier Blockchain framework to increase protection and autonomy of smart objects in the IoT 39
A System for Privacy-Preserving Access Accountability in Critical Environments 38
A new ego network model and an approach to extracting an ego network compliant with this model from a Social Internetworking System 37
A new approach for electronic signature 36
A model for handling multiple social networks and its implementation 36
slr-kit: A semi-supervised machine learning framework for systematic literature reviews 35
A lightweight electronic signature scheme using Twitter 35
Investigating the phenomenon of NSFW posts in Reddit 34
An enhanced behavioral fingerprinting approach for the Internet of Things 33
The challenge of privacy in the cloud 33
A system for privacy-preserving analysis of vehicle movements 32
Anonymous Access Monitoring of Indoor Areas 32
A threat to friendship privacy in Facebook 31
Is the sharing economy about sharing at all? A linguistic analysis of Aribnb reviews 30
Querying the IoT Using Multiresolution Contexts 30
Recommendation of reliable users, social networks and high-quality resources in a Social Internetworking System 29
Completeness, Correctness and Freshness of Cloud-Managed Data Streams 29
SISO: a conceptual framework for the construction of" stereotypical maps" in a Social Internetworking Scenario 29
eIDas public digital identity systems: Beyond online authentication to support urban security 29
Contrasting false identities in social networks by trust chains and biometric reinforcement 29
Restoring Information Needed for Social Internetworking Analysis from Anonymized Data 28
A conceptual framework and an underlying model for community detection and management in a Social Internetworking scenario 28
Generating K-Anonymous Logs of People-Tracing Systems in Surveilled Environments 28
Internetworking assortativity in Facebook 28
Tweetchain: An alternative to blockchain for crowd-based applications 28
Discovering good links between objects in the internet of things 28
Discovering hidden me edges in a Social Internetworking Scenario 28
Moving from Social Networks to Social Internetworking Scenarios: the Crawling Perspective 27
Accountability-Preserving Anonymous Delivery of Cloud Services 27
A Privacy-Preserving Solution for Tracking People in Critical Environments 27
Finding reliable users and social networks in a social internetworking system 26
A system for extracting structural information from Social Network accounts 26
A Model Implementing Certified Reputation and its Application to TripAdvisor 26
Driving Global Team Formation in Social Networks to Obtain Diversity 25
A Model to Support Multi-Social-Network Applications 25
Find the Right Peers: Building and Querying Multi-IoT Networks Based on Contexts 25
Trust-Based Intrusion Tolerant Routing in Wireless Sensor Networks 25
Range Query Integrity in Cloud Data Streams With Efficient Insertion 24
A Middleware to Allow Fine-Grained Access Control of Twitter Applications 24
Recommendation of similar users, resources and social networks in a Social Internetworking Scenario 23
Multi-dimensional contexts for querying IoT networks 23
Time series forecasting for predictive maintenance of refrigeration systems 21
How COVID-19 affects user interaction with online streaming service providers on twitter 21
The Role of Schema and Document Matchings in XML Source Clustering 21
A novel IoT trust model leveraging fully distributed behavioral fingerprinting and secure delegation 20
Investigating Information Diffusion in a Multi-Social-Network Scenario via Answer Set Programming 20
Fortifying TripAdvisor against Reputation-System Attacks 19
Overcoming limits of blockchain for IoT applications 18
Investigating negative reviews and detecting negative influencers in Yelp through a multi-dimensional social network based model 18
null 17
Range Query Integrity in the Cloud: the Case of Video Surveillance 17
Recursive recognition of offline handwritten mathematical expressions 17
Supporting Information Spread in a Social Internetworking Scenario 16
Experiences Using BDS: A Crawler for Social Internetworking Scenarios 16
Crawling Social Internetworking Systems 16
Measuring Betweennes Centrality in Social Internetworking Scenarios 16
Discovering Links among Social Networks 16
Bridge-Driven Search in Social Internetworking Scenarios 15
Supporting community mining and people recommendations in a social internetworking scenario 14
Analysis of Video Lessons: a Case for Smart Indexing and Topic Extraction 13
Exploitation of user actions to recommend similar users, resources and social networks in a Social Internetworking Scenario 13
null 13
Turning Privacy-preserving Mechanisms against Federated Learning 11
Investigating Node Influence Maximization and Influential Node Characterization in a Multi-Social-Network Scenario via Disjunctive Logic Programming 11
Increasing protection and autonomy in the IoT through a two-tier blockchain framework (Discussion paper) 10
A Fully Privacy-Preserving Solution for Anomaly Detection in IoT using Federated Learning and Homomorphic Encryption 10
Interest assortativity in Twitter 10
The role of social media on the evolution of companies: A Twitter analysis of Streaming Service Providers 8
A deep reinforcement learning approach for security-aware service acquisition in IoT 8
SeCTIS: A framework to Secure CTI Sharing 7
Semantic Hierarchical Indexing for Online Video Lessons Using Natural Language Processing 6
Predicting Tweet Engagement with Graph Neural Networks 6
The SemIoE Ontology: A Semantic Model Solution for an IoE-Based Industry 6
Not only databases: Social data and cybersecurity perspective 6
Relation Extraction Techniques in Cyber Threat Intelligence 6
Dataspaces: Concepts, Architectures and Initiatives 5
OSTIS: A novel Organization-Specific Threat Intelligence System 4
Applying AI in the Area of Automation Systems: Overview and Challenges 2
Totale 2.467
Categoria #
all - tutte 16.571
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 16.571


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020101 0 0 0 0 0 0 9 5 6 18 58 5
2020/2021101 4 2 0 32 22 10 3 5 9 3 8 3
2021/2022331 3 6 10 23 8 5 1 24 17 9 51 174
2022/2023962 104 51 8 66 44 115 5 73 431 9 30 26
2023/2024436 34 41 34 48 47 97 24 16 6 7 38 44
2024/2025293 22 111 18 46 28 66 2 0 0 0 0 0
Totale 2.467