OLIVA, GABRIELE
 Distribuzione geografica
Continente #
NA - Nord America 319
EU - Europa 240
AS - Asia 54
OC - Oceania 13
SA - Sud America 6
AF - Africa 3
Totale 635
Nazione #
US - Stati Uniti d'America 307
GB - Regno Unito 114
IT - Italia 73
IN - India 19
AU - Australia 13
CA - Canada 12
DE - Germania 10
NO - Norvegia 8
TR - Turchia 8
NL - Olanda 7
CN - Cina 5
BR - Brasile 4
ES - Italia 4
HK - Hong Kong 4
FR - Francia 3
ID - Indonesia 3
JP - Giappone 3
MY - Malesia 3
ZA - Sudafrica 3
BE - Belgio 2
CH - Svizzera 2
CL - Cile 2
HU - Ungheria 2
IE - Irlanda 2
KR - Corea 2
RU - Federazione Russa 2
SG - Singapore 2
UA - Ucraina 2
AE - Emirati Arabi Uniti 1
AL - Albania 1
CZ - Repubblica Ceca 1
DK - Danimarca 1
FI - Finlandia 1
GR - Grecia 1
IS - Islanda 1
JO - Giordania 1
KW - Kuwait 1
PK - Pakistan 1
RO - Romania 1
SI - Slovenia 1
SK - Slovacchia (Repubblica Slovacca) 1
TW - Taiwan 1
Totale 635
Città #
Ashburn 163
London 108
Rome 40
Washington 24
San Francisco 21
Boardman 20
Council Bluffs 20
Pune 15
Toronto 12
West Jordan 10
Seattle 8
Trondheim 8
Genoa 7
Sydney 5
Melbourne 4
Santa Clara 4
Central 3
Los Angeles 3
Nanjing 3
São Paulo 3
Ansbach 2
Austin 2
Blackrock 2
Budapest 2
Canberra 2
Cardiff 2
Driebergen-Rijsenburg 2
Frankfurt am Main 2
Frignano 2
Manchester 2
Massarosa 2
Pontian 2
Pretoria 2
Redmond 2
Santa Maria a Monte 2
Singapore 2
Staden 2
Stadskanaal 2
Trieste 2
Almere Stad 1
Amman 1
Amsterdam 1
Athens 1
Barcelona 1
Berlin 1
Bratislava 1
Brno 1
Butterworth 1
Cambridge 1
Cape Town 1
Champs-sur-Marne 1
Charlotte 1
Delft 1
Gainesville 1
Geneva 1
Genova 1
Haikou 1
Helsinki 1
Islamabad 1
Kawasaki 1
Kennebunk 1
Kilmarnock 1
Krasnoyarsk 1
Kuenzelsau 1
Kuwait City 1
Lincoln 1
Ljubljana 1
Madrid 1
Mandurah 1
Milan 1
Mumbai 1
Munich 1
Nuremberg 1
Paris 1
Prato 1
Reykjavik 1
Rockville 1
Rybinsk 1
Seoul 1
Surabaya 1
Taipei 1
Tirana 1
Tokyo 1
Vercelli 1
Visakhapatnam 1
West Lafayette 1
Totale 566
Nome #
Anomaly and attack detection in supervisory control networks for cyber-physical systems 36
Cyber threats for operational technologies 23
A Suite of Distributed Methodologies to Solve the Sparse Analytic Hierarchy Process Problem 19
Best Effort Workload Disparity Minimization in Multi-Agent Systems with Capacity Constraints 13
Distributed Finite-Time k-means Clustering with Quantized Communucation and Transmission Stopping 11
Integrated management of safety and security in Seveso sites-sociotechnical perspectives 11
A Spatial Decision Support System for Prioritizing Repair Interventions on Power Networks 11
Distributed Markov Chain Redesign for Multi-Agent Decision-Making Problems 11
Distributed Asynchronous Projection onto the Intersection of Convex Sets 11
Waveform Similarity Analysis using Graph Mining for the Optimization of Sensor Positioning in Wearable Seismocardiography 11
Optimal Man-In-The-Middle Stealth Attack 11
Distributed Mode Computation in Open Multi-Agent Systems 10
IoT in the Hospital Scenario: Hospital 4.0, Blockchain and Robust Data Management 10
Distributed Finite-time Optimization for Compromise-Seeking Agents with Relative Preferences 9
Characterising ranking stability in interval pairwise comparison matrices 9
Evaluating the COVID-19 impact in Italian regions via multi criteria analysis 9
Sparse and distributed Analytic Hierarchy Process 9
Physical security barriers and protection distances for seveso sites 9
Moving from looking to understanding: Situation awareness and prediction 9
Access time eccentricity and diameter 9
Optimal Redesign of Markov Chains with Prescribed Repulsive Distribution 9
A Finite-Time Protocol for Distributed Time-Varying Optimization Over a Graph 8
Characterization of protein–protein interfaces through a protein contact network approach 8
Agent-based input-output interdependency model 8
IIot in the hospital scenario: Hospital 4.0, blockchain and robust data management 8
Aggregating centrality rankings: A novel approach to detect critical infrastructure vulnerabilities 8
A REference implementation of interoperable indoor location & communication systems for FIrst Responders: the REFIRE project 8
A Strategy to Improve Infrastructure Survivability via Prioritizing Critical Nodes Protection 8
Intelligence-aware batch processing for tma with bearings-only measurements 8
Distributed Estimation of Node Centrality with Application to Agreement Problems in Social Networks 8
Private Consensus using Chaotic Oscillator-Based Encryption 7
Optimal Stealth Attacks to Cyber-Physical Systems: Seeking a Compromise between Maximum Damage and Effort 7
Distributed finite-time calculation of node eccentricities, graph radius and graph diameter 7
Performance and robustness of discrete and finite time average consensus algorithms 7
Distributed consensus under ambiguous information 7
Assessing bone loss in micro-gravity: A fuzzy approach 7
Fuzzy dynamic Input-Output Inoperability Model 7
Augmenting rescuer safety using wireless sensor networks 7
Assessing node criticality in dynamical distributed systems 7
Distributed Negotiation for Reaching Agreement among Reluctant Players in Cooperative Multi-Agent Systems 7
A multi-criteria model for the security assessment of large-infrastructure construction sites 7
Distributed and proximity-constrained C-means for discrete coverage control 7
Distributed and Asynchronous Secure State Reconstruction for Cyber-Physical Systems 6
Online distributed synchronizability check for networks of interconnected systems 6
Finding critical nodes in infrastructure networks 6
Distributed utility estimation with heterogeneous relative information 6
Multi-criteria node criticality assessment framework for critical infrastructure networks 6
A Holistic-Reductionistic Approach for Modeling Interdependencies 6
Modelling and Simulation of Critical Infrastructures 6
White paper on industry experiences in critical information infrastructure security: A special session at CRITIS 2019 6
Analysis of Severe Space Weather on Critical Infrastructures 6
Consensus of agents with fuzzy state 6
Fuzzy chaotic logistic maps 6
Opinion-based optimal group formation 6
Assessing protein resilience via a complex network approach 6
Identifying Critical Infrastructure Clusters via Spectral Analysis 6
Decentralized spatial decomposition for traffic signal synchronization 6
Robustness to rank reversal in pairwise comparison matrices based on uncertainty bounds 5
Secure gossip against intermittently malicious agents 5
A Secure Communication Protocol with Application to Networked Kalman Filtering 5
Time-varying input-output inoperability model 5
Gossip algorithm for multi-agent systems via random walk 5
A Stackelberg game-theoretical approach to maritime counter-piracy 5
Distributed opinion dynamics with heterogeneous reputation 5
Infrastructure Interdependencies: Modeling and Analysis 5
On field gesture-based human-robot interface for emergency responders 5
An amendment to Distributed synchronization under uncertainty: A fuzzy approach 5
Robustness vs. Control in Distributed Systems 5
Use of drone to improve healthcare efficiency and sustainability 5
Network Structural Vulnerability: A Multiobjective Attacker Perspective 4
Distributed synchronization under uncertainty: a Fuzzy Approach 4
Critical clusters in interdependent economic sectors 4
Performance Analysis of Single and Multi-objective Approaches for the Critical Node Detection Problem 4
Sensor networks localization: extending trilateration via shadow edges 4
Exploiting routing information in Wireless Sensor Networks localization 4
Faulty or malicious anchor detection criteria for distance-based localization 4
Simultaneous localization and routing in sensor networks using shadow edges 4
Discovering vulnerabilities in heterogeneous interconnected systems 4
Fuzzy importance measures for ranking key interdependent sectors under uncertainty 4
Distributed Cycle Detection and Removal 4
Distributed finite-time average-consensus with limited computational and storage capability 4
Distributed Estimation and Control of Node Centrality in Undirected Asymmetric Networks 4
The faster the better: On the shortest paths role for near real-time decision making of water utilities 4
Incomplete analytic hierarchy process with minimum weighted ordinal violations 4
Network defensive strategy definition based on node criticality 4
Towards Asynchronous State Reconstruction via Time Projection. Preliminary Results in the case of two Sensors 4
Distance-constrained data clustering by combined k-means algorithms and opinion dynamics filters 3
Discrete-Time LTI Fuzzy Systems: Stability and Representation 3
Fuzzy dynamic input–output inoperability model 3
Sparse analytic hierarchy process: an experimental analysis 3
Distributed C-Means Clustering via Broadcast-Only Token-Passing 3
Distributed Calculation of Edge-Disjoint Spanning Trees for Robustifying Distributed Algorithms Against Man-in-the-Middle Attacks 3
Stability and level-wise representation of fuzzy systems 3
Distributed flow network balancing with minimal effort 3
Exploiting the Synchronization of Nonlinear Dynamics to Secure Distributed Consensus 2
Discrete-time linear systems with fuzzy dynamics 2
Novel Vulnerability Metrics for Interdependent Systems based on System Controllability 2
Network localization by Shadow Edges 2
Hybrid sensor networks localization dealing with range-capable and range-free nodes 2
Noisy localization over unit disk graphs: The shadow edge approach 2
Totale 670
Categoria #
all - tutte 17.643
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 17.643


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2021/2022166 0 1 7 0 0 0 0 4 25 5 5 119
2022/2023106 2 2 2 7 16 2 4 2 0 21 39 9
2023/2024411 9 51 27 33 51 181 1 10 13 35 0 0
Totale 683