COSTA, GABRIELE
 Distribuzione geografica
Continente #
EU - Europa 5.613
NA - Nord America 3.425
AS - Asia 1.712
SA - Sud America 399
AF - Africa 78
Continente sconosciuto - Info sul continente non disponibili 12
OC - Oceania 5
Totale 11.244
Nazione #
RU - Federazione Russa 4.156
US - Stati Uniti d'America 3.331
IT - Italia 535
SG - Singapore 496
CN - Cina 485
BR - Brasile 353
SE - Svezia 210
TR - Turchia 157
DE - Germania 150
GB - Regno Unito 148
UA - Ucraina 146
HK - Hong Kong 125
VN - Vietnam 108
IN - India 103
IL - Israele 80
CA - Canada 63
FR - Francia 43
KR - Corea 42
BG - Bulgaria 40
FI - Finlandia 38
BE - Belgio 27
KE - Kenya 24
MX - Messico 23
AR - Argentina 22
ES - Italia 22
PL - Polonia 21
ZA - Sudafrica 21
BD - Bangladesh 18
PK - Pakistan 17
AT - Austria 14
IQ - Iraq 12
EU - Europa 11
JP - Giappone 11
MA - Marocco 11
NL - Olanda 11
CZ - Repubblica Ceca 10
ID - Indonesia 10
LT - Lituania 8
MY - Malesia 8
SN - Senegal 8
UZ - Uzbekistan 8
CO - Colombia 5
DZ - Algeria 5
GR - Grecia 5
IE - Irlanda 5
PT - Portogallo 5
VE - Venezuela 5
AE - Emirati Arabi Uniti 4
AZ - Azerbaigian 4
CL - Cile 4
CR - Costa Rica 4
EC - Ecuador 4
AU - Australia 3
DK - Danimarca 3
HU - Ungheria 3
TW - Taiwan 3
BH - Bahrain 2
BO - Bolivia 2
CH - Svizzera 2
IR - Iran 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
NP - Nepal 2
NZ - Nuova Zelanda 2
PY - Paraguay 2
RO - Romania 2
SA - Arabia Saudita 2
SK - Slovacchia (Repubblica Slovacca) 2
TG - Togo 2
TN - Tunisia 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
BA - Bosnia-Erzegovina 1
BF - Burkina Faso 1
BJ - Benin 1
CY - Cipro 1
EE - Estonia 1
EG - Egitto 1
GE - Georgia 1
HN - Honduras 1
HR - Croazia 1
KG - Kirghizistan 1
LK - Sri Lanka 1
LU - Lussemburgo 1
MK - Macedonia 1
MZ - Mozambico 1
NI - Nicaragua 1
NO - Norvegia 1
OM - Oman 1
PA - Panama 1
PE - Perù 1
RS - Serbia 1
SV - El Salvador 1
TH - Thailandia 1
UY - Uruguay 1
ZW - Zimbabwe 1
Totale 11.244
Città #
Moscow 1.089
Ashburn 704
Chandler 372
Jacksonville 324
Singapore 258
Dallas 231
Boardman 204
Hefei 184
Beijing 163
San Mateo 163
Hong Kong 113
Kocaeli 101
São Paulo 84
Ann Arbor 82
New York 79
Wilmington 73
Rome 64
Tel Aviv 59
Milan 57
Los Angeles 56
Dong Ket 54
Lawrence 49
Princeton 49
Istanbul 45
Shanghai 44
Seoul 41
Sofia 39
London 37
Genoa 36
Ottawa 33
Munich 32
Chicago 31
Ogden 31
Council Bluffs 30
Lucca 30
Andover 29
Helsinki 28
Bolzaneto 26
Houston 26
Nairobi 24
Woodbridge 24
The Dalles 23
Ho Chi Minh City 20
Brussels 16
Atlanta 15
Hanoi 15
Frankfurt am Main 14
Johannesburg 14
Voghera 14
Warsaw 14
Chennai 13
Avezzano 12
Denver 12
Mexico City 12
Montreal 12
Poplar 11
Toronto 11
Vienna 11
Boston 10
Brooklyn 10
Columbus 10
Florence 10
Redmond 10
Tokyo 10
Turku 10
Düsseldorf 9
Hangzhou 9
Livorno 9
Pisa 9
Bressanvido 8
Orem 8
Palembang 8
Santa Clara 8
Seattle 8
Albignasego 7
Amsterdam 7
Guangzhou 7
Lahore 7
Patna 7
Phoenix 7
Pietrasanta 7
Savona 7
Stockholm 7
Tashkent 7
Valencia 7
Dearborn 6
Falls Church 6
Manchester 6
San Francisco 6
St Petersburg 6
Turin 6
Urbino 6
Baghdad 5
Belo Horizonte 5
Brasília 5
Contagem 5
Delhi 5
Dublin 5
Hillsboro 5
Kuala Lumpur 5
Totale 5.742
Nome #
Building next generation Cyber Ranges with CRACK 310
Detection of images with adult content for parental control on mobile devices 276
Extending Security-by-Contract with Quantitative Trust on Mobile Devices 257
Bring your own device, securely 257
Enhancing malware classification with symbolic features 254
Automatic security verification of mobile app configurations 253
Elective temporal logic 241
Securing Java with local policies 236
Extending Security-by-Contract with Quantitative Trust on Mobile Devices 229
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs 226
FLEX: A flexible code authentication framework for delegating mobile app customization 223
Securing Java with local policies 221
A NERD DOGMA: Introducing CTF to Non-Expert Audience 216
Jalapa: Securing Java with Local Policies 214
Gate automata-driven run-time enforcement 213
Modular Plans for Secure Service Composition 213
Market-based security for mobile devices 212
Runtime monitoring for next generation Java ME platform 211
Private-Yet-Verifiable Contact Tracing 210
Formal Modeling and Reasoning about the Android Security Framework 209
Jalapa: Securing Java with Local Policies 207
Securing the “bring your own device” policy 205
Modular plans for secure service composition 203
Secure Service Orchestration in Open Networks 202
Lazy Security Controllers 201
From Natural Projection to Partial Model Checking and Back 199
Android vs. SEAndroid: An empirical assessment 196
Developing a NATO BYOD security policy 193
Trust-Driven Policy Enforcement through Gate Automata 192
Android Permissions Unleashed 187
Trustworthy Opportunistic Access to the Internet of Services 187
Managerial insights on investment strategy in cybersecurity: findings from multi-country research 185
Systems Security Modeling and Analysis at IMT Lucca 184
Secure Service Composition with Symbolic Effects 184
Formal modeling and automatic enforcement of Bring Your Own Device policies 182
Formally verifying security protocols built on watermarking and jamming 180
Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity 179
A survey on multi-factor authentication for online banking in the wild 178
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning 176
Enabling BYOD through secure meta-market 173
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs 170
Scenario design and validation for next generation cyber ranges 166
Software security: The language approach 158
Turning Federated Learning Systems into Covert Channels 156
Securing the ``Bring Your Own Device'' Paradigm 156
PolEnA: Enforcing fine-grained permission policies in android 154
Strong authentication for e-banking: A survey on european regulations and implementations 148
Multi-dimensional Secure Service Orchestration 148
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners 148
Securing android with local policies 146
Designing a Serious Game for Cybersecurity Education 145
Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings 142
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols 140
Toward dynamic epistemic verification of zero-knowledge protocols 138
Automating Penetration Testing with MeTeOr 135
Mobile App Security Analysis with the MAVeriC Static Analysis Module 135
Mobile app security assessment with the maveric dynamic analysis module 134
HArMoNICS: High-Assurance Microgrid Network Infrastructure Case Study 126
LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework 116
Supporting criminal investigations on the blockchain: a temporal logic-based approach 50
Welcome back: a systematic literature review of smart contract reentrancy and countermeasures 42
Cybersecurity, per le imprese italiane è una sfida «culturale» (che non si può più rinviare) 22
The Postman: A Journey of Ethical Hacking in PosteID/SPID Borderland 20
Natural Projection as Partial Model Checking 9
Totale 11.378
Categoria #
all - tutte 46.248
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 46.248


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021641 0 0 0 0 11 40 65 7 131 199 42 146
2021/2022552 110 4 29 8 67 18 120 63 17 18 57 41
2022/2023969 128 84 13 130 86 144 16 77 117 40 126 8
2023/2024644 42 29 79 33 51 12 78 14 54 80 74 98
2024/20253.750 57 84 137 236 66 326 729 154 405 448 872 236
2025/20264.030 233 267 1.185 2.133 212 0 0 0 0 0 0 0
Totale 11.378