MARTINELLI, FABIO
 Distribuzione geografica
Continente #
NA - Nord America 1.635
AS - Asia 686
EU - Europa 112
AF - Africa 5
Totale 2.438
Nazione #
US - Stati Uniti d'America 1.633
SG - Singapore 613
KR - Corea 42
IT - Italia 37
FI - Finlandia 35
CN - Cina 22
DE - Germania 20
GB - Regno Unito 8
FR - Francia 5
SY - Repubblica araba siriana 3
UG - Uganda 3
BE - Belgio 2
CA - Canada 2
EG - Egitto 2
IN - India 2
NL - Olanda 2
RO - Romania 2
AT - Austria 1
HK - Hong Kong 1
JP - Giappone 1
PK - Pakistan 1
TW - Taiwan 1
Totale 2.438
Città #
Santa Clara 1.494
Singapore 464
Seoul 42
Helsinki 35
Guangzhou 15
Cascina 8
Boardman 5
Falkenstein 5
Forest City 4
London 4
Phoenix 4
Cairo 2
Campobasso 2
Castelfranco Veneto 2
Corsico 2
Fort Worth 2
Koekelberg 2
Mazzano 2
Meudon 2
New Delhi 2
Pisa 2
Prineville 2
Rome 2
Watford 2
Amsterdam 1
Ashburn 1
Cambridge 1
Cluj-Napoca 1
Dortmund 1
Florence 1
Frankfurt am Main 1
Hamburg 1
Macerata Campania 1
Milan 1
Montreal 1
Musashino 1
Naples 1
Pasadena 1
Seattle 1
Springfield 1
Toronto 1
Venice 1
Vienna 1
Totale 2.125
Nome #
Assessment of seasonal variations in particulate matter accumulation and elemental composition in urban tree species 24
Product Incremental Security Risk Assessment using DevSecOps Practices 21
Optimisation of cyber insurance coverage with selection of cost effective security controls 17
A Survey over Low-Level Security Issues in Heavy Duty Vehicles 15
Usage control in cloud federations 13
Cyber Risk management: an actuarial point of view 13
Emotions and Interests of Evolving Twitter Bots 12
Introducing Usage Control in MQTT 12
A Joint Safety and Security Analysis of message protection for CAN bus protocol 12
2Faces: a new model of malware based on dynamic compiling and reflection 12
Obligation Management in Usage Control Systems 12
Semiring-base Specification Approaches for Quantitative Security 11
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints 11
Who's Driving My Car? A Machine Learning based Approach to Driver Identification 11
Atti del convegno sulle attività di ricerca e l'innovazione per la sicurezza 11
An Exploratory Study on the Evolution of Android Malware Quality 11
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints 11
CARS: Context Aware Reputation Systems to evaluate vehicles' behaviour 11
Improving security in industry 4.0 by extending OPC-UA with usage control 11
Trade-Off Analysis of Safety and Security in CAN bus communication 11
Formal Methods for Android Banking Malware Analysis and Detection 10
A "pay-how-you-drive" car insurance approach through cluster analysis 10
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily 10
There are two sides to every question: Controller versus attacker 10
Deduction and Abduction with Soft Constraints 10
Phylogenetic Analysis for Ransomware Detection and Classification into Families 10
Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach 10
Human behavior characterization for driving style recognition in vehicle system 10
Semiring-based Specification Approaches for Quantitative Security 10
A Framework for Probabilistic Contract Compliance 10
A Multi-Criteria-based Evaluation of Android Applications 10
Usage Control on Cloud systems 10
A multi-criteria ranking of security countermeasures 10
Current Research Issues on Cyber security in Robotics 10
Enforcing mobile application security through probabilistic contracts 10
Are Photos On Social Networks Really Private? 10
Fast and effective clustering of spam emails based on structural similarity 10
How to Grant Less Permissions to Facebook Applications 10
Newsletter Serit n. 10 10
Newsletter Serit n. 9 10
Weighted Datalog and Levels of Trust 10
A Survey on Security for Mobile Devices 10
Risk-Aware Usage Decision Making in Highly Dynamic Systems 9
A collaborative framework for generating probabilistic contracts 9
A survey on security for mobile devices 9
Towards collaborative cyber threat intelligence for security management 9
Towards Enforcing On-The-Fly Policies in BYOD Environments 9
A Multi-Criteria-Based Evaluation of Android Applications 9
Remote Policy Enforcement for Trusted Application Execution in Mobile Environments 9
Newsletter Serit n. 5 9
Improving MQTT by inclusion of usage control 9
Newsletter Serit - numero speciale "Serit Award" seconda edizione 9
Digital Waste Disposal: an automated framework for analysis of spam emails 9
Cyber Insurance and Security Interdependence: Friends or Foes? 9
Probabilistic Contract Compliance for Mobile Applications 9
Privacy-Preserving Text Mining as a Service 9
Newsletter Serit - numero speciale "Serit Award" 9
Dynamic mobile malware detection through system call-based image representation 9
Application of Secure Two-Party Computation in a Privacy-Preserving Android App. 9
Cluster Analysis for Driver Aggressiveness Identification 9
Secure software engineering for connected vehicles: a research agenda 9
Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices 9
Classifying Android Malware Through Subgraph Mining 9
Newsletter Serit n. 7 9
Evaluating model checking for cyber threats code obfuscation identification 9
Enhancing security in ETSI open source MANO with usage control capability 9
Reputation-based composition of social web services 9
Cyber risk management: a new challenge for actuarial mathematics 9
Who's Driving My Car? A machine learning based approach to driver identification 9
Improving Role-based Access to Android Applications with JCHR 9
Introducing probabilities in contract-based approaches for mobile application security 9
Dependability in dynamic, evolving and heterogeneous systems: the CONNECT approach 9
Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability 9
Digital waste sorting: A goal-based, self-learning approach to label spam email campaigns 9
A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware 9
Electric Vehicle Security and Privacy: A Comparative Analysis of Charging Methods 9
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 9
Towards Attribute-based Access Control Policy Engineering Using Risk 9
Network Security Supported by Arguments 9
Risk-based Auto Delegation for Probabilistic Availability 9
Towards Modelling Adaptive Attacker's Behaviour 8
Time-continuous Authorization of Network Resources based on Usage Control 8
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols 8
Newsletter Serit n. 4 8
Machine Learning meets iOS Malware: Identifying Malicious Applications on Apple Environment 8
Privacy Preserving Clustering over Horizontal and Vertical Partitioned Data 8
Enhancing Java Security with History Based Access Control 8
Alfabeto digitale - puntata sessantatre - la cyberwar 8
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments 8
Technical Periodic Report (1st period) of the C3ISP Project (G.A. n. 700294_H2020_Project) "Collaborative and Confidential Information Sharing and Analysis for Cyber Protection": PR_CORE_1 8
Enhancing Usage Control for Performance: A Proposal for Systems of Systems 8
Managing QoS in Smart Buildings Through Software Defined Network and Usage Control 8
A privacy preserving infrastructure for driver's reputation aware automotive services 8
Formal modelling and verification in service-oriented computing 8
Security by insurance for services 8
Privacy preserving distributed computation of private attributes for collaborative privacy aware usage control systems 8
Testing of PolPA-based usage control systems 8
Driver Identification Through Formal Methods 8
Application Security for Mobile Devices 8
Visualizing the outcome of dynamic analysis of Android malware with VizMal 8
Totale 984
Categoria #
all - tutte 11.176
article - articoli 2.923
book - libri 171
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 686
Totale 14.956


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202482 0 0 0 0 0 0 0 0 5 2 64 11
2024/20252.380 27 42 518 252 1.262 279 0 0 0 0 0 0
Totale 2.462