VISAGGIO, CORRADO AARON
 Distribuzione geografica
Continente #
AS - Asia 681
NA - Nord America 519
EU - Europa 182
SA - Sud America 130
AF - Africa 13
OC - Oceania 2
Totale 1.527
Nazione #
US - Stati Uniti d'America 504
SG - Singapore 267
HK - Hong Kong 250
BR - Brasile 99
VN - Vietnam 72
IT - Italia 66
RU - Federazione Russa 40
DE - Germania 34
CN - Cina 21
AR - Argentina 16
IN - India 14
BD - Bangladesh 11
AT - Austria 9
CA - Canada 7
EC - Ecuador 7
ID - Indonesia 7
NL - Olanda 7
MX - Messico 5
MY - Malesia 5
IQ - Iraq 4
NP - Nepal 4
PE - Perù 4
AL - Albania 3
FR - Francia 3
IE - Irlanda 3
JO - Giordania 3
PH - Filippine 3
PK - Pakistan 3
TR - Turchia 3
UZ - Uzbekistan 3
ZA - Sudafrica 3
AU - Australia 2
CZ - Repubblica Ceca 2
DZ - Algeria 2
EE - Estonia 2
ES - Italia 2
FI - Finlandia 2
GB - Regno Unito 2
KE - Kenya 2
LB - Libano 2
LY - Libia 2
SE - Svezia 2
TN - Tunisia 2
UA - Ucraina 2
AF - Afghanistan, Repubblica islamica di 1
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
BO - Bolivia 1
CO - Colombia 1
CR - Costa Rica 1
GE - Georgia 1
GR - Grecia 1
GY - Guiana 1
IL - Israele 1
JP - Giappone 1
KR - Corea 1
OM - Oman 1
PT - Portogallo 1
RO - Romania 1
SA - Arabia Saudita 1
SV - El Salvador 1
SY - Repubblica araba siriana 1
UG - Uganda 1
VE - Venezuela 1
Totale 1.527
Città #
San Jose 276
Hong Kong 248
Santa Clara 104
Singapore 68
The Dalles 33
Ho Chi Minh City 26
Munich 19
Ashburn 17
Rome 14
Hanoi 13
Nuremberg 13
Beijing 10
Marcianise 6
Milan 6
New York 6
Los Angeles 5
São Paulo 5
Lecce 4
Quito 4
Amman 3
Bari 3
Belo Horizonte 3
Belém 3
Chicago 3
Fortaleza 3
Haiphong 3
Kuala Lumpur 3
Manila 3
Mexico City 3
Naples 3
Orem 3
Tirana 3
Boardman 2
Bến Tre 2
Council Bluffs 2
Curitiba 2
Dhaka 2
Dublin 2
Goiânia 2
Granada 2
Johannesburg 2
Lahore 2
Lima 2
Maceió 2
Mar del Plata 2
Montecosaro 2
Montreal 2
Muzambinho 2
New Delhi 2
Niterói 2
Novo Hamburgo 2
Palestrina 2
Paraíso do Tocantins 2
Pedro Leopoldo 2
Pelotas 2
Rio Claro 2
San Francisco 2
Seattle 2
Sorocaba 2
Stockholm 2
Strasbourg 2
Taboão da Serra 2
Tallinn 2
Tashkent 2
Thrissur 2
Thái Nguyên 2
Toronto 2
Tripoli 2
Turku 2
Venice 2
Acquaviva delle Fonti 1
Ahmedabad 1
Alfenas 1
Alife 1
Alvorada 1
Americana 1
Amsterdam 1
Ananindeua 1
Anchorage 1
Araras 1
Arequipa 1
Arujá 1
Arvada 1
Avellaneda 1
Baghdad 1
Balsas 1
Batna City 1
Baturité 1
Belén de Escobar 1
Berlin 1
Biratnagar 1
Blagoveshchensk 1
Bologna 1
Boston 1
Brasília 1
Bridgetown 1
Brooklyn 1
Béjaïa 1
Caieiras 1
Campinas 1
Totale 1.022
Nome #
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges 41
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? 40
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms 37
A Classifier of Malicious Android Applications 35
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones 31
A systematic literature review of IoT time series anomaly detection solutions 30
R-PackDroid: API package-based characterization and detection of mobile ransomware 28
Process Diversity and how practitioners can manage it 27
Patchworking: Exploring the code changes induced by vulnerability fixing activities 26
An exploratory study on the evolution of Android malware quality 25
A three-layered model to implement data privacy policies 25
A comparison of static, dynamic, and hybrid analysis for malware detection 25
Demystifying the adoption of behavior-driven development in open source projects 24
"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification 24
Malware detection employed by visualization and deep neural network 24
An empirical study of metric-based methods to detect obfuscated code 23
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications 23
Advanced transcriptase for JavaScript malware 23
An Automatic Framework for Detecting Normalization Flaws in Databases 23
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases 22
About the Robustness and Looseness of Yara Rules 22
Adversarial deep learning for energy management in buildings 22
ProMisE: A Framework for Process Models Customization to the Operative Context 21
SecDefender: Detecting low-quality models in multidomain federated learning systems 21
An Empirical Investigation on the Trade-off between Smart Contract Readability and Gas Consumption 21
A study on misclassification of software vulnerabilities when using deep learning and machine learning algorithms 21
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter 20
Profiling gas consumption in solidity smart contracts 20
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 20
Functional suitability assessment of smart contracts: A survey and first proposal 19
Detection and robustness evaluation of android malware classifiers 19
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media 19
Building measure-based prediction models for UML class diagram maintainability 18
Investigating the criticality of user-reported issues through their relations with app rating 18
Pair Designing as Practice for Enforcing and Diffusing Design Knowledge 18
A family of experiments to validate metrics for software process models 18
A set of features to detect web security threats 18
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis 18
What would users change in my app? summarizing app reviews for recommending software changes 18
Towards the definition of a maintainability model for web applications 17
On the effectiveness of system API-related information for Android ransomware detection 17
Exploiting Natural Language Structures in Software Informal Documentation 17
Dynamic Software Community of Practice through Three-layered Competence Model 16
Identifying safety–critical concerns in unmanned aerial vehicle software platforms with SALIENT 16
Managing Trust in Social Networks 16
Malicious JavaScript Detection by Features Extraction 16
Clustering versus SVM for malware detection 15
Ransomware Steals Your Phone. Formal Methods Rescue It 15
Evaluating Performances of Pair Designing in Industry 15
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features 14
Introducing Quality System in Small and medium Enterprises: an Experience Report 14
Identifying Mobile Repackaged Applications through Formal Methods 14
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 14
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics 14
How can i improve my app? Classifying user reviews for software maintenance and evolution 13
FMESP: Framework for the modelling and evaluation of Software Processes 13
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges 13
Mobile Silent and Continuous Authentication using Apps Sequence 13
Talos: no more ransomware victims with formal methods 13
WECAP: A Web Environment for Project Planning 13
How distribution affects the success of pair programming 13
Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities 13
An HMM and structural entropy based detector for Android malware: An empirical study 12
Repadiography: Towards a visual support for triaging repackaged ApPs 12
Session Management Vulnerabilities in Today's Web 12
Enhancing online discussion forums with topic-driven content search and assisted posting 12
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware 12
GANG-MAM: GAN based enGine for Modifying Android Malware 12
Metamorphic Malware Detection Using Code Metrics 12
L’Integrazione delle Competenze nelle Relazioni Università-Imprese: un Caso di Studio sulla Gestione dei Knowledge Workers nelle ICT 12
ISCREAM: A suite for Smart Contract REAdability assessMent 12
Pair designing as a practice for enforcing and diffusing design knowledge 11
SURF: summarizer of user reviews feedback 11
Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) 11
WECAP: A Web Environment for Project Planning 11
Obfuscation techniques against signature-based detection: A case study 11
Support vector machines and malware detection 11
An NLP-based Tool for Software Artifacts Analysis 11
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks 11
Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms 10
SocioBot: a Twitter-based botnet 10
Malware Detection Using Dynamic Birthmarks 10
FMESP: Framework for the Modeling and Evaluation of Software Processes 10
Exploring Mobile User Experience Through Code Quality Metrics 10
Download malware? no, thanks: how formal methods can block update attacks 10
Classic cryptanalysis using hidden Markov models 10
Hey Malware, I Can Find You! 10
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications 9
ARdoc: app reviews development oriented classifier 9
Does Enforcing Anonymity Mean Decreasing Data Usefulness? 9
Identification of Android Malware Families with Model Checking 9
la misurazione della conoscenza tecnologica nelle organizzazione produttrici di software 9
Applying a framework for the improvement of software process maturity 9
Android apps and user feedback: a dataset for software evolution and quality improvement 9
Silent and Continuous Authentication in Mobile Environment 8
DECA: development emails content analyzer 8
Detection of Malicious Web Pages Using System Calls Sequences 8
Clustering for malware classification 7
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis 7
Totale 1.638
Categoria #
all - tutte 8.548
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 8.548


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2024/2025628 0 0 0 0 0 265 179 7 60 31 29 57
2025/20261.010 54 31 81 220 33 14 100 110 251 116 0 0
Totale 1.638