VISAGGIO, CORRADO AARON
 Distribuzione geografica
Continente #
AS - Asia 521
NA - Nord America 200
EU - Europa 119
SA - Sud America 101
AF - Africa 5
OC - Oceania 1
Totale 947
Nazione #
HK - Hong Kong 234
SG - Singapore 215
US - Stati Uniti d'America 190
BR - Brasile 88
IT - Italia 45
VN - Vietnam 40
DE - Germania 33
AT - Austria 9
RU - Federazione Russa 8
AR - Argentina 6
BD - Bangladesh 6
ID - Indonesia 5
IN - India 5
NL - Olanda 5
CA - Canada 4
MX - Messico 3
MY - Malesia 3
PE - Perù 3
CN - Cina 2
CZ - Repubblica Ceca 2
EC - Ecuador 2
EE - Estonia 2
ES - Italia 2
FI - Finlandia 2
FR - Francia 2
GB - Regno Unito 2
IE - Irlanda 2
PH - Filippine 2
SE - Svezia 2
ZA - Sudafrica 2
AF - Afghanistan, Repubblica islamica di 1
AL - Albania 1
AO - Angola 1
AU - Australia 1
BB - Barbados 1
CO - Colombia 1
CR - Costa Rica 1
DZ - Algeria 1
GR - Grecia 1
IQ - Iraq 1
JO - Giordania 1
JP - Giappone 1
LB - Libano 1
NP - Nepal 1
SV - El Salvador 1
SY - Repubblica araba siriana 1
TR - Turchia 1
UA - Ucraina 1
UG - Uganda 1
UZ - Uzbekistan 1
VE - Venezuela 1
Totale 947
Città #
Hong Kong 234
Santa Clara 101
Singapore 44
The Dalles 33
Munich 19
Ho Chi Minh City 16
Ashburn 13
Nuremberg 13
Rome 13
Hanoi 8
Marcianise 6
Lecce 4
São Paulo 4
Bari 3
Belo Horizonte 3
Chicago 3
Los Angeles 3
Belém 2
Boardman 2
Dhaka 2
Dublin 2
Fortaleza 2
Goiânia 2
Granada 2
Haiphong 2
Johannesburg 2
Kuala Lumpur 2
Maceió 2
Manila 2
Mexico City 2
Milan 2
Muzambinho 2
Niterói 2
Paraíso do Tocantins 2
Pedro Leopoldo 2
Quito 2
Rio Claro 2
San Francisco 2
Seattle 2
Sorocaba 2
Stockholm 2
Strasbourg 2
Taboão da Serra 2
Tallinn 2
Thrissur 2
Thái Nguyên 2
Turku 2
Venice 2
Alfenas 1
Alvorada 1
Americana 1
Amman 1
Ananindeua 1
Araras 1
Arequipa 1
Arujá 1
Avellaneda 1
Balsas 1
Batna City 1
Boston 1
Bridgetown 1
Brooklyn 1
Bến Tre 1
Caieiras 1
Campinas 1
Campo Grande 1
Caracas 1
Cidade Gaúcha 1
Contagem 1
Curitiba 1
Custódia 1
Da Nang 1
Damascus 1
Espírito Santo do Pinhal 1
Fighiera 1
Frigento 1
Guaranésia 1
Ha Long 1
Hamburg 1
Hyderabad 1
Hải Dương 1
Inglewood 1
Iporá 1
Itabira 1
Itajubá 1
Itapevi 1
Itaquaquecetuba 1
Itatiba 1
Ituiutaba 1
Jardín América 1
Jundiaí 1
Juneau 1
Kabul 1
Kampala 1
Kathmandu 1
Kirkuk 1
Kolomyia 1
Kozhikode 1
La Plata 1
Lanham 1
Totale 634
Nome #
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges 29
A Classifier of Malicious Android Applications 27
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms 27
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? 22
A systematic literature review of IoT time series anomaly detection solutions 22
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones 22
R-PackDroid: API package-based characterization and detection of mobile ransomware 19
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases 18
A comparison of static, dynamic, and hybrid analysis for malware detection 18
Demystifying the adoption of behavior-driven development in open source projects 17
About the Robustness and Looseness of Yara Rules 17
Adversarial deep learning for energy management in buildings 17
"Mirror, Mirror on the Wall, Who is the Fairest One of All?" - Machine Learning versus Model Checking: A Comparison between Two Static Techniques for Malware Family Identification 16
ProMisE: A Framework for Process Models Customization to the Operative Context 16
SecDefender: Detecting low-quality models in multidomain federated learning systems 16
An empirical study of metric-based methods to detect obfuscated code 16
An exploratory study on the evolution of Android malware quality 16
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications 16
An Empirical Investigation on the Trade-off between Smart Contract Readability and Gas Consumption 16
A study on misclassification of software vulnerabilities when using deep learning and machine learning algorithms 16
Advanced transcriptase for JavaScript malware 16
A three-layered model to implement data privacy policies 16
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter 15
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media 15
An Automatic Framework for Detecting Normalization Flaws in Databases 15
A set of features to detect web security threats 14
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 14
Process Diversity and how practitioners can manage it 13
Malware detection employed by visualization and deep neural network 13
Functional suitability assessment of smart contracts: A survey and first proposal 12
Detection and robustness evaluation of android malware classifiers 12
Identifying safety–critical concerns in unmanned aerial vehicle software platforms with SALIENT 12
A family of experiments to validate metrics for software process models 12
Profiling gas consumption in solidity smart contracts 12
Patchworking: Exploring the code changes induced by vulnerability fixing activities 12
Building measure-based prediction models for UML class diagram maintainability 11
Clustering versus SVM for malware detection 11
Towards the definition of a maintainability model for web applications 11
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics 11
Investigating the criticality of user-reported issues through their relations with app rating 10
Introducing Quality System in Small and medium Enterprises: an Experience Report 10
Dynamic Software Community of Practice through Three-layered Competence Model 10
On the effectiveness of system API-related information for Android ransomware detection 10
L’Integrazione delle Competenze nelle Relazioni Università-Imprese: un Caso di Studio sulla Gestione dei Knowledge Workers nelle ICT 10
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis 10
What would users change in my app? summarizing app reviews for recommending software changes 10
Malicious JavaScript Detection by Features Extraction 10
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges 9
Mobile Silent and Continuous Authentication using Apps Sequence 9
Ransomware Steals Your Phone. Formal Methods Rescue It 9
Identifying Mobile Repackaged Applications through Formal Methods 9
Exploiting Natural Language Structures in Software Informal Documentation 9
How can i improve my app? Classifying user reviews for software maintenance and evolution 8
Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features 8
Repadiography: Towards a visual support for triaging repackaged ApPs 8
Talos: no more ransomware victims with formal methods 8
Evaluating Performances of Pair Designing in Industry 8
Enhancing online discussion forums with topic-driven content search and assisted posting 8
WECAP: A Web Environment for Project Planning 8
Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) 8
An NLP-based Tool for Software Artifacts Analysis 8
Session Management Vulnerabilities in Today's Web 7
SURF: summarizer of user reviews feedback 7
Pair Designing as Practice for Enforcing and Diffusing Design Knowledge 7
GANG-MAM: GAN based enGine for Modifying Android Malware 7
WECAP: A Web Environment for Project Planning 7
Obfuscation techniques against signature-based detection: A case study 7
Exploring Mobile User Experience Through Code Quality Metrics 7
Managing Trust in Social Networks 7
How distribution affects the success of pair programming 7
Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities 7
ISCREAM: A suite for Smart Contract REAdability assessMent 7
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 7
Download malware? no, thanks: how formal methods can block update attacks 7
Hey Malware, I Can Find You! 7
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications 6
An HMM and structural entropy based detector for Android malware: An empirical study 6
Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms 6
SocioBot: a Twitter-based botnet 6
Malware Detection Using Dynamic Birthmarks 6
ARdoc: app reviews development oriented classifier 6
Pair designing as a practice for enforcing and diffusing design knowledge 6
FMESP: Framework for the Modeling and Evaluation of Software Processes 6
Does Enforcing Anonymity Mean Decreasing Data Usefulness? 6
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware 6
Identification of Android Malware Families with Model Checking 6
Android apps and user feedback: a dataset for software evolution and quality improvement 6
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks 6
Classic cryptanalysis using hidden Markov models 6
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis 6
Silent and Continuous Authentication in Mobile Environment 5
Clustering for malware classification 5
DECA: development emails content analyzer 5
Detection of Malicious Web Pages Using System Calls Sequences 5
Metamorphic Malware Detection Using Code Metrics 5
Support vector machines and malware detection 5
la misurazione della conoscenza tecnologica nelle organizzazione produttrici di software 5
Applying a framework for the improvement of software process maturity 5
FMESP: Framework for the modelling and evaluation of Software Processes 3
Totale 1.058
Categoria #
all - tutte 7.134
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 7.134


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2024/2025628 0 0 0 0 0 265 179 7 60 31 29 57
2025/2026430 54 31 81 220 33 11 0 0 0 0 0 0
Totale 1.058