MARTINELLI, FABIO
 Distribuzione geografica
Continente #
AS - Asia 7.580
NA - Nord America 3.856
SA - Sud America 1.574
EU - Europa 1.317
AF - Africa 135
OC - Oceania 6
Continente sconosciuto - Info sul continente non disponibili 1
Totale 14.469
Nazione #
US - Stati Uniti d'America 3.668
SG - Singapore 3.370
CN - Cina 1.682
BR - Brasile 1.306
VN - Vietnam 853
HK - Hong Kong 735
FR - Francia 406
KR - Corea 298
IT - Italia 222
NL - Olanda 197
IN - India 126
DE - Germania 111
AR - Argentina 109
JP - Giappone 109
GB - Regno Unito 102
CA - Canada 77
BD - Bangladesh 75
MX - Messico 60
FI - Finlandia 55
ID - Indonesia 51
EC - Ecuador 45
IL - Israele 41
ZA - Sudafrica 39
IQ - Iraq 31
CO - Colombia 30
AT - Austria 29
SA - Arabia Saudita 28
RU - Federazione Russa 25
TR - Turchia 25
PL - Polonia 22
ES - Italia 21
PK - Pakistan 21
EG - Egitto 20
UA - Ucraina 20
VE - Venezuela 19
PE - Perù 18
PY - Paraguay 18
CL - Cile 17
UZ - Uzbekistan 17
KE - Kenya 16
TN - Tunisia 16
SE - Svezia 14
AE - Emirati Arabi Uniti 12
MA - Marocco 12
CR - Costa Rica 10
IE - Irlanda 10
PH - Filippine 10
UY - Uruguay 10
DO - Repubblica Dominicana 9
JO - Giordania 9
BE - Belgio 8
HN - Honduras 8
RO - Romania 8
TH - Thailandia 8
AZ - Azerbaigian 7
DZ - Algeria 7
LB - Libano 7
LT - Lituania 7
MY - Malesia 7
PT - Portogallo 7
TT - Trinidad e Tobago 7
TW - Taiwan 7
UG - Uganda 7
KZ - Kazakistan 6
RS - Serbia 6
SK - Slovacchia (Repubblica Slovacca) 6
AL - Albania 5
KG - Kirghizistan 5
NP - Nepal 5
BG - Bulgaria 4
BH - Bahrain 4
MD - Moldavia 4
NI - Nicaragua 4
PS - Palestinian Territory 4
SN - Senegal 4
SY - Repubblica araba siriana 4
AU - Australia 3
CZ - Repubblica Ceca 3
DK - Danimarca 3
GR - Grecia 3
HR - Croazia 3
JM - Giamaica 3
KH - Cambogia 3
KW - Kuwait 3
LV - Lettonia 3
NZ - Nuova Zelanda 3
OM - Oman 3
AD - Andorra 2
AM - Armenia 2
BN - Brunei Darussalam 2
BS - Bahamas 2
BY - Bielorussia 2
CI - Costa d'Avorio 2
GH - Ghana 2
GT - Guatemala 2
HU - Ungheria 2
LK - Sri Lanka 2
MN - Mongolia 2
NO - Norvegia 2
PR - Porto Rico 2
Totale 14.441
Città #
Singapore 1.956
Santa Clara 1.507
Hong Kong 725
Hefei 606
San Jose 437
Lauterbourg 348
Beijing 324
Ho Chi Minh City 322
Seoul 292
Ashburn 239
Hanoi 185
Los Angeles 181
New York 95
São Paulo 93
Dallas 90
Tokyo 67
Da Nang 44
Rio de Janeiro 39
Buffalo 36
Helsinki 36
Minamishinagawa 36
Guangzhou 34
Haiphong 34
Frankfurt am Main 33
Belo Horizonte 32
Brasília 32
Cascina 29
Council Bluffs 25
Montreal 25
Orem 25
Nuremberg 24
Chicago 23
Bengaluru 22
Dhaka 22
Phoenix 21
Toronto 21
Biên Hòa 20
Pisa 19
Campinas 18
Johannesburg 18
Chennai 17
Guarulhos 17
Lappeenranta 17
Milan 17
Porto Alegre 17
Rome 17
Warsaw 17
Atlanta 16
London 16
Curitiba 15
Nairobi 15
Tashkent 15
Fortaleza 14
Vienna 14
Brooklyn 13
Guayaquil 13
Hải Dương 13
Mumbai 13
Ribeirão Preto 13
Salvador 13
Can Tho 12
Denver 12
Jeddah 12
Thái Bình 12
Bắc Giang 11
Cairo 11
Düsseldorf 11
Lima 11
Shanghai 11
Boston 10
Quận Bình Thạnh 10
Quận Một 10
Stockholm 10
The Dalles 10
Thái Nguyên 10
Tunis 10
Uberlândia 10
Amman 9
Amsterdam 9
Boardman 9
Goiânia 9
Mexico City 9
Miami 9
New Delhi 9
Ninh Bình 9
Quito 9
Sorocaba 9
Asunción 8
Baghdad 8
City of London 8
Córdoba 8
Dublin 8
Florence 8
Hortolândia 8
Joinville 8
Madrid 8
Manaus 8
Newark 8
Osasco 8
Recife 8
Totale 8.814
Nome #
Towards Policy Engineering for Attribute-based Access Control 147
Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation 99
Usage control in cloud federations 94
Emotions and Interests of Evolving Twitter Bots 91
Semiring-base Specification Approaches for Quantitative Security 89
Explainable Deep Learning Methodologies for Biomedical Images Classification 85
Time-continuous Authorization of Network Resources based on Usage Control 77
Optimisation of cyber insurance coverage with selection of cost effective security controls 76
A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes 75
Product Incremental Security Risk Assessment using DevSecOps Practices 75
Towards Modelling Adaptive Attacker's Behaviour 74
A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning 73
On usage control for GRID systems 72
Introducing Usage Control in MQTT 72
Risk-Aware Usage Decision Making in Highly Dynamic Systems 70
A collaborative framework for generating probabilistic contracts 69
A prototype for Enforcing Usage Control Policies Based on XACML 66
Vulnerable Smart Contract Detection by Means of Model Checking 66
Formal Methods for Android Banking Malware Analysis and Detection 65
Alfabeto digitale - puntata sessantatre - la cyberwar 65
Preserving Security Properties under Refinement 63
Driver Identification Through Formal Methods 63
Classification of security properties - Part II : network security 62
AntiCheetah: Trustworthy computing in an outsourced (cheating) environment 62
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints 62
A survey on security for mobile devices 60
Weighted Datalog and Levels of Trust 60
Getmewhere: A Location-Based Privacy-Preserving Information Service 58
Logical Specification and Analysis of Fault Tolerant Systems Through Partial Model Checking. 56
Newsletter Serit n. 4 56
There are two sides to every question: Controller versus attacker 56
A Privacy-Preserving Solution for Intelligent Transportation Systems: Private Driver DNA 55
Technical Periodic Report M36 (2st period - final) of the C3ISP Project (G.A. n. 700294_H2020_Project) "Collaborative and Confidential Information Sharing and Analysis for Cyber Protection": PR_CORE_2 55
Improving security in industry 4.0 by extending OPC-UA with usage control 55
Application Security for Mobile Devices 55
Cyber-insurance survey 54
2Faces: a new model of malware based on dynamic compiling and reflection 54
Realizzazione di un' applicazione per l' incremento della sicurezza dei dispositivi mobili 53
Formal Methods Meet Mobile Code Obfuscation 53
Towards Information Flow Properties for Distributed Systems 53
Towards an interpretable deep learning model for mobile malware detection and family identification 53
A Semantic Foundation for Trust Management Languages with Weights: An Application to the RTFamily 53
Digital Waste Sorting: A Goal-Based, Self-Learning Approach to Label Spam Email Campaigns 53
Privacy-Preserving Data Sharing for Collaborative Analytics in Multi-Modal Transportation Systems. 53
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols 52
Extending the Globus architecture with Role-Based Trust Management 52
Dynamic mobile malware detection through system call-based image representation 52
Implementing Usage Control in Internet of Things: A Smart Home Use Case 52
A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction with Soft Constraints 52
Electric Vehicle Security and Privacy: A Comparative Analysis of Charging Methods 52
Practical Privacy Preserving Medical Diagnosis using Homomorphic Encryption 51
Applying generalized non deducibility on compositions (GNDC) approach in dependability 51
A "pay-how-you-drive" car insurance approach through cluster analysis 51
Human behavior characterization for driving style recognition in vehicle system 51
Email spoofing attack detection through an end to end authorship attribution system 51
Android collusion: Detecting malicious applications inter-communication through SharedPreferences 51
A Social Engineering Attack to Leak Private Information from Android In-Vehicle Infotainment Systems 51
Privacy Preserving Clustering over Horizontal and Vertical Partitioned Data 50
Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments 50
A Joint Safety and Security Analysis of message protection for CAN bus protocol 50
MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes 49
Digital Waste Disposal: an automated framework for analysis of spam emails 49
A Multi-Criteria-based Evaluation of Android Applications 49
Current Research Issues on Cyber security in Robotics 49
A tour of secure software engineering solutions for connected vehicles 49
Cyber risk management: a new challenge for actuarial mathematics 49
Semiring-based Specification Approaches for Quantitative Security 48
Application of Secure Two-Party Computation in a Privacy-Preserving Android App. 48
Enforcing mobile application security through probabilistic contracts 48
Cybsersecurity issues in robotics 48
Behavioral analysis for a continuous user authentication 48
Image-based malware family detection: An assessment between feature extraction and classification techniques 48
Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers 48
Machine Learning meets iOS Malware: Identifying Malicious Applications on Apple Environment 47
Deduction and Abduction with Soft Constraints 47
Newsletter Serit n. 7 47
How Discover a Malware using Model Checking 46
A formal support for collaborative data sharing 46
Automated Analysis of Timed Security: a Case Study on Web Privacy 46
Enhancing Usage Control for Performance: A Proposal for Systems of Systems 46
Phylogenetic Analysis for Ransomware Detection and Classification into Families 46
Cyber Risk Management: a new challange for actuarial Mathematics 46
Cybersecurity and Privacy 46
Using recurrent neural networks for continuous authentication through gait analysis 46
Analysing EMMS with compositional proof rules for non interference 45
Preface to Formal Aspects in Security and Trust (FAST): 5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers 45
Privacy-Preserving Interest-Cast for Android smartphones 45
Technical Periodic Report (1st period) of the C3ISP Project (G.A. n. 700294_H2020_Project) "Collaborative and Confidential Information Sharing and Analysis for Cyber Protection": PR_CORE_1 45
Context-Awareness Mobile Devices for Traffic Incident Prevention 45
Broadcast authentication for resource constrained devices: A major pitfall and some solutions 45
Classifying Android Malware Through Subgraph Mining 45
Improving Role-based Access to Android Applications with JCHR 45
A Survey over Low-Level Security Issues in Heavy Duty Vehicles 45
Trade-Off Analysis of Safety and Security in CAN bus communication 45
Towards collaborative cyber threat intelligence for security management 44
CANDY: A social engineering attack to leak information from infotainment system 44
Cyber insurance and time-to-compromise: An integrated approach 44
Cyber Risk management: an actuarial point of view 44
Preventing the drop in security investments for non-competitive cyber-insurance market 44
A Survey on Cyber-Insurance 44
Totale 5.629
Categoria #
all - tutte 51.217
article - articoli 14.207
book - libri 570
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 2.874
Totale 68.868


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2023/202482 0 0 0 0 0 0 0 0 5 2 64 11
2024/20255.739 27 42 516 239 1.250 291 27 289 253 264 1.345 1.196
2025/20268.732 432 928 861 1.378 1.716 375 1.427 525 376 483 231 0
Totale 14.553