COSTA, GABRIELE
 Distribuzione geografica
Continente #
EU - Europa 2.797
NA - Nord America 2.777
AS - Asia 1.187
SA - Sud America 285
AF - Africa 50
Continente sconosciuto - Info sul continente non disponibili 12
OC - Oceania 4
Totale 7.112
Nazione #
US - Stati Uniti d'America 2.721
RU - Federazione Russa 1.536
IT - Italia 491
SG - Singapore 390
BR - Brasile 258
CN - Cina 205
SE - Svezia 203
TR - Turchia 153
UA - Ucraina 145
DE - Germania 124
GB - Regno Unito 118
HK - Hong Kong 110
IL - Israele 79
IN - India 77
VN - Vietnam 63
CA - Canada 47
KR - Corea 42
BG - Bulgaria 39
FI - Finlandia 35
BE - Belgio 26
KE - Kenya 24
FR - Francia 18
AR - Argentina 13
PK - Pakistan 13
EU - Europa 11
CZ - Repubblica Ceca 10
ID - Indonesia 8
MA - Marocco 8
MX - Messico 8
SN - Senegal 8
MY - Malesia 7
ES - Italia 6
IQ - Iraq 6
DZ - Algeria 5
GR - Grecia 5
LT - Lituania 5
NL - Olanda 5
BD - Bangladesh 4
CL - Cile 4
IE - Irlanda 4
JP - Giappone 4
PL - Polonia 4
PT - Portogallo 4
AT - Austria 3
HU - Ungheria 3
TW - Taiwan 3
UZ - Uzbekistan 3
VE - Venezuela 3
AE - Emirati Arabi Uniti 2
AU - Australia 2
AZ - Azerbaigian 2
BH - Bahrain 2
BO - Bolivia 2
CH - Svizzera 2
DK - Danimarca 2
EC - Ecuador 2
IR - Iran 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
NZ - Nuova Zelanda 2
RO - Romania 2
SA - Arabia Saudita 2
SK - Slovacchia (Repubblica Slovacca) 2
ZA - Sudafrica 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
BA - Bosnia-Erzegovina 1
EE - Estonia 1
EG - Egitto 1
GE - Georgia 1
HR - Croazia 1
LK - Sri Lanka 1
LU - Lussemburgo 1
NO - Norvegia 1
PA - Panama 1
PE - Perù 1
PY - Paraguay 1
TG - Togo 1
TH - Thailandia 1
TN - Tunisia 1
UY - Uruguay 1
Totale 7.112
Città #
Ashburn 608
Moscow 381
Chandler 366
Jacksonville 323
Singapore 240
Boardman 200
San Mateo 163
Beijing 102
Kocaeli 101
Hong Kong 99
Ann Arbor 82
Wilmington 73
São Paulo 65
Rome 62
New York 61
Tel Aviv 59
Dong Ket 54
Milan 52
Lawrence 49
Princeton 49
Istanbul 45
Shanghai 44
Seoul 41
Sofia 39
Genoa 36
Ottawa 33
London 32
Ogden 31
Los Angeles 30
Andover 29
Lucca 29
Bolzaneto 26
Chicago 26
Council Bluffs 26
Helsinki 25
Nairobi 24
Woodbridge 24
The Dalles 23
Houston 22
Munich 20
Brussels 16
Voghera 14
Avezzano 12
Dallas 12
Redmond 10
Turku 10
Düsseldorf 9
Hangzhou 9
Palembang 8
Florence 7
Frankfurt am Main 7
Guangzhou 7
Hefei 7
Patna 7
Pietrasanta 7
Pisa 7
Savona 7
Albignasego 6
Atlanta 6
Dearborn 6
Falls Church 6
Livorno 6
Mexico City 6
Toronto 6
Turin 6
Belo Horizonte 5
Contagem 5
Lahore 5
Seattle 5
Siena 5
Verdellino 5
Amantea 4
Assago 4
Baghdad 4
Catanzaro 4
Chions 4
Dakar 4
Delhi 4
Dublin 4
Fairfield 4
Hanoi 4
Hanover 4
Kuala Lumpur 4
Las Vegas 4
Lisbon 4
Montreal 4
Olomouc 4
Rabat 4
San Francisco 4
Tokyo 4
Urbino 4
Venice 4
Warsaw 4
Alicante 3
Bologna 3
Boston 3
Brno 3
Capannori 3
Curitiba 3
Fisciano 3
Totale 4.137
Nome #
Building next generation Cyber Ranges with CRACK 226
Detection of images with adult content for parental control on mobile devices 191
Enhancing malware classification with symbolic features 177
Extending Security-by-Contract with Quantitative Trust on Mobile Devices 175
Securing Java with local policies 175
Elective temporal logic 164
Bring your own device, securely 164
Automatic security verification of mobile app configurations 163
Extending Security-by-Contract with Quantitative Trust on Mobile Devices 159
Securing Java with local policies 158
Runtime monitoring for next generation Java ME platform 157
Gate automata-driven run-time enforcement 156
Jalapa: Securing Java with Local Policies 154
Modular Plans for Secure Service Composition 153
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs 153
Secure Service Orchestration in Open Networks 152
Lazy Security Controllers 151
Jalapa: Securing Java with Local Policies 150
Market-based security for mobile devices 148
From Natural Projection to Partial Model Checking and Back 146
Securing the “bring your own device” policy 144
FLEX: A flexible code authentication framework for delegating mobile app customization 139
Private-Yet-Verifiable Contact Tracing 139
A NERD DOGMA: Introducing CTF to Non-Expert Audience 136
Trustworthy Opportunistic Access to the Internet of Services 134
Trust-Driven Policy Enforcement through Gate Automata 133
Secure Service Composition with Symbolic Effects 130
Modular plans for secure service composition 130
Formal Modeling and Reasoning about the Android Security Framework 125
Android vs. SEAndroid: An empirical assessment 118
Android Permissions Unleashed 114
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning 114
Scenario design and validation for next generation cyber ranges 112
Formal modeling and automatic enforcement of Bring Your Own Device policies 109
Developing a NATO BYOD security policy 106
PolEnA: Enforcing fine-grained permission policies in android 105
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs 105
A survey on multi-factor authentication for online banking in the wild 103
Securing android with local policies 102
Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity 101
Strong authentication for e-banking: A survey on european regulations and implementations 101
Enabling BYOD through secure meta-market 100
Systems Security Modeling and Analysis at IMT Lucca 99
Formally verifying security protocols built on watermarking and jamming 99
Securing the ``Bring Your Own Device'' Paradigm 99
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners 99
Multi-dimensional Secure Service Orchestration 97
Software security: The language approach 93
Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings 92
Turning Federated Learning Systems into Covert Channels 87
Mobile App Security Analysis with the MAVeriC Static Analysis Module 87
Mobile app security assessment with the maveric dynamic analysis module 86
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols 83
Toward Dynamic Epistemic Verification of Zero-Knowledge Protocols 62
Managerial insights on investment strategy in cybersecurity: findings from multi-country research 59
Designing a Serious Game for Cybersecurity Education 55
LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework 54
HArMoNICS: High-Assurance Microgrid Network Infrastructure Case Study 53
Automating Penetration Testing with MeTeOr 51
Totale 7.227
Categoria #
all - tutte 36.027
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 36.027


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202040 0 0 0 0 0 0 0 0 0 0 0 40
2020/2021836 96 19 47 33 11 40 65 7 131 199 42 146
2021/2022552 110 4 29 8 67 18 120 63 17 18 57 41
2022/2023963 128 84 13 127 86 141 16 77 117 40 126 8
2023/2024644 42 29 79 33 51 12 78 14 54 80 74 98
2024/20253.638 57 84 137 236 66 326 729 154 405 448 872 124
Totale 7.227