COSTA, GABRIELE
 Distribuzione geografica
Continente #
EU - Europa 5.158
NA - Nord America 3.133
AS - Asia 1.502
SA - Sud America 380
AF - Africa 71
Continente sconosciuto - Info sul continente non disponibili 12
OC - Oceania 5
Totale 10.261
Nazione #
RU - Federazione Russa 3.788
US - Stati Uniti d'America 3.063
IT - Italia 513
CN - Cina 430
SG - Singapore 395
BR - Brasile 340
SE - Svezia 203
TR - Turchia 157
DE - Germania 147
UA - Ucraina 146
GB - Regno Unito 128
HK - Hong Kong 120
IN - India 92
VN - Vietnam 86
IL - Israele 80
CA - Canada 49
KR - Corea 42
FR - Francia 41
BG - Bulgaria 40
FI - Finlandia 38
BE - Belgio 27
KE - Kenya 24
AR - Argentina 19
PK - Pakistan 17
ZA - Sudafrica 16
ES - Italia 14
MX - Messico 14
BD - Bangladesh 12
IQ - Iraq 12
EU - Europa 11
CZ - Repubblica Ceca 10
ID - Indonesia 10
MA - Marocco 10
AT - Austria 9
PL - Polonia 8
SN - Senegal 8
MY - Malesia 7
JP - Giappone 6
LT - Lituania 6
NL - Olanda 6
UZ - Uzbekistan 6
DZ - Algeria 5
GR - Grecia 5
IE - Irlanda 5
PT - Portogallo 5
AZ - Azerbaigian 4
CL - Cile 4
CO - Colombia 4
CR - Costa Rica 4
VE - Venezuela 4
AU - Australia 3
DK - Danimarca 3
EC - Ecuador 3
HU - Ungheria 3
TW - Taiwan 3
AE - Emirati Arabi Uniti 2
BH - Bahrain 2
BO - Bolivia 2
CH - Svizzera 2
IR - Iran 2
KZ - Kazakistan 2
LA - Repubblica Popolare Democratica del Laos 2
LB - Libano 2
NP - Nepal 2
NZ - Nuova Zelanda 2
PY - Paraguay 2
RO - Romania 2
SA - Arabia Saudita 2
SK - Slovacchia (Repubblica Slovacca) 2
TN - Tunisia 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AM - Armenia 1
BA - Bosnia-Erzegovina 1
BF - Burkina Faso 1
BJ - Benin 1
CY - Cipro 1
EE - Estonia 1
EG - Egitto 1
GE - Georgia 1
HN - Honduras 1
HR - Croazia 1
KG - Kirghizistan 1
LK - Sri Lanka 1
LU - Lussemburgo 1
MK - Macedonia 1
MZ - Mozambico 1
NI - Nicaragua 1
NO - Norvegia 1
OM - Oman 1
PA - Panama 1
PE - Perù 1
RS - Serbia 1
TG - Togo 1
TH - Thailandia 1
UY - Uruguay 1
ZW - Zimbabwe 1
Totale 10.261
Città #
Moscow 1.043
Ashburn 622
Chandler 372
Jacksonville 324
Singapore 245
Dallas 227
Boardman 200
Hefei 184
San Mateo 163
Beijing 143
Hong Kong 108
Kocaeli 101
Ann Arbor 82
Wilmington 73
São Paulo 72
New York 65
Rome 62
Tel Aviv 59
Dong Ket 54
Milan 54
Lawrence 49
Princeton 49
Istanbul 45
Shanghai 44
Seoul 41
Sofia 39
Genoa 36
Los Angeles 35
London 34
Ottawa 33
Munich 32
Ogden 31
Lucca 30
Andover 29
Chicago 29
Helsinki 28
Bolzaneto 26
Council Bluffs 26
Nairobi 24
Woodbridge 24
The Dalles 23
Houston 22
Brussels 16
Frankfurt am Main 14
Voghera 14
Avezzano 12
Ho Chi Minh City 11
Atlanta 10
Columbus 10
Redmond 10
Turku 10
Düsseldorf 9
Hangzhou 9
Hanoi 9
Johannesburg 9
Pisa 9
Bressanvido 8
Mexico City 8
Palembang 8
Warsaw 8
Albignasego 7
Boston 7
Florence 7
Guangzhou 7
Lahore 7
Patna 7
Pietrasanta 7
Savona 7
Toronto 7
Vienna 7
Dearborn 6
Falls Church 6
Livorno 6
Santa Clara 6
St Petersburg 6
Tashkent 6
Turin 6
Urbino 6
Baghdad 5
Belo Horizonte 5
Brasília 5
Brooklyn 5
Contagem 5
Delhi 5
Dublin 5
Hillsboro 5
Las Vegas 5
Nuremberg 5
Osasco 5
Phoenix 5
Rabat 5
San Francisco 5
Seattle 5
Siena 5
Tokyo 5
Valencia 5
Venice 5
Verdellino 5
Amantea 4
Assago 4
Totale 5.392
Nome #
Building next generation Cyber Ranges with CRACK 286
Detection of images with adult content for parental control on mobile devices 251
Enhancing malware classification with symbolic features 235
Extending Security-by-Contract with Quantitative Trust on Mobile Devices 233
Automatic security verification of mobile app configurations 232
Bring your own device, securely 230
Securing Java with local policies 224
Elective temporal logic 219
VeriOSS: Using the Blockchain to Foster Bug Bounty Programs 215
Securing Java with local policies 210
Extending Security-by-Contract with Quantitative Trust on Mobile Devices 208
Jalapa: Securing Java with Local Policies 205
Gate automata-driven run-time enforcement 204
Modular Plans for Secure Service Composition 204
Runtime monitoring for next generation Java ME platform 202
Market-based security for mobile devices 201
FLEX: A flexible code authentication framework for delegating mobile app customization 200
Jalapa: Securing Java with Local Policies 199
Private-Yet-Verifiable Contact Tracing 199
Securing the “bring your own device” policy 196
Secure Service Orchestration in Open Networks 195
Modular plans for secure service composition 194
A NERD DOGMA: Introducing CTF to Non-Expert Audience 192
Lazy Security Controllers 191
Formal Modeling and Reasoning about the Android Security Framework 188
From Natural Projection to Partial Model Checking and Back 188
Trust-Driven Policy Enforcement through Gate Automata 182
Trustworthy Opportunistic Access to the Internet of Services 177
Android vs. SEAndroid: An empirical assessment 175
Secure Service Composition with Symbolic Effects 175
Developing a NATO BYOD security policy 170
Android Permissions Unleashed 169
WAF-A-MoLE: Evading web application firewalls through adversarial machine learning 166
Formal modeling and automatic enforcement of Bring Your Own Device policies 166
Formally verifying security protocols built on watermarking and jamming 162
WAF-A-MoLE: An adversarial tool for assessing ML-based WAFs 161
A survey on multi-factor authentication for online banking in the wild 159
Systems Security Modeling and Analysis at IMT Lucca 158
Managerial insights on investment strategy in cybersecurity: findings from multi-country research 156
Scenario design and validation for next generation cyber ranges 155
Why Mary Can Hack: Effectively Introducing High School Girls to Cybersecurity 154
Enabling BYOD through secure meta-market 150
Software security: The language approach 149
Securing the ``Bring Your Own Device'' Paradigm 147
Turning Federated Learning Systems into Covert Channels 145
PolEnA: Enforcing fine-grained permission policies in android 145
Securing android with local policies 140
Multi-dimensional Secure Service Orchestration 139
Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners 139
Strong authentication for e-banking: A survey on european regulations and implementations 137
Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, TACAS 2015 held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, Proceedings 134
MuFASA: A Tool for High-level Specification and Analysis of Multi-factor Authentication Protocols 132
Mobile App Security Analysis with the MAVeriC Static Analysis Module 129
Mobile app security assessment with the maveric dynamic analysis module 125
Toward dynamic epistemic verification of zero-knowledge protocols 115
HArMoNICS: High-Assurance Microgrid Network Infrastructure Case Study 114
Automating Penetration Testing with MeTeOr 112
Designing a Serious Game for Cybersecurity Education 109
LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework 104
Supporting criminal investigations on the blockchain: a temporal logic-based approach 16
Welcome back: a systematic literature review of smart contract reentrancy and countermeasures 13
Natural Projection as Partial Model Checking 9
The Postman: A Journey of Ethical Hacking in PosteID/SPID Borderland 1
Totale 10.390
Categoria #
all - tutte 43.843
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 43.843


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021674 0 0 0 33 11 40 65 7 131 199 42 146
2021/2022552 110 4 29 8 67 18 120 63 17 18 57 41
2022/2023969 128 84 13 130 86 144 16 77 117 40 126 8
2023/2024644 42 29 79 33 51 12 78 14 54 80 74 98
2024/20253.750 57 84 137 236 66 326 729 154 405 448 872 236
2025/20263.042 233 267 1.185 1.357 0 0 0 0 0 0 0 0
Totale 10.390