ZANERO, STEFANO
 Distribuzione geografica
Continente #
EU - Europa 9.427
NA - Nord America 8.626
AS - Asia 6.000
AF - Africa 946
SA - Sud America 298
OC - Oceania 289
Continente sconosciuto - Info sul continente non disponibili 66
Totale 25.652
Nazione #
US - Stati Uniti d'America 8.012
IT - Italia 3.667
CN - Cina 1.413
IN - India 1.067
DE - Germania 996
FR - Francia 904
GB - Regno Unito 839
NL - Olanda 552
CA - Canada 516
JP - Giappone 330
HK - Hong Kong 307
MY - Malesia 302
SG - Singapore 275
IR - Iran 265
AU - Australia 257
RU - Federazione Russa 247
KR - Corea 242
VN - Vietnam 237
IE - Irlanda 207
TW - Taiwan 198
CZ - Repubblica Ceca 185
RO - Romania 184
ES - Italia 183
TR - Turchia 176
ID - Indonesia 175
ET - Etiopia 171
AT - Austria 167
GR - Grecia 156
PK - Pakistan 150
ZA - Sudafrica 149
NG - Nigeria 141
UA - Ucraina 136
BR - Brasile 131
SE - Svezia 130
CH - Svizzera 129
SA - Arabia Saudita 116
BE - Belgio 108
FI - Finlandia 108
IL - Israele 92
PL - Polonia 92
PT - Portogallo 90
MA - Marocco 89
PH - Filippine 82
NO - Norvegia 70
IQ - Iraq 66
MX - Messico 64
AE - Emirati Arabi Uniti 63
TH - Thailandia 62
BD - Bangladesh 60
KE - Kenya 59
EG - Egitto 57
LK - Sri Lanka 57
EU - Europa 54
CL - Cile 48
DZ - Algeria 47
JO - Giordania 45
EE - Estonia 42
CO - Colombia 41
HU - Ungheria 34
GH - Ghana 32
NP - Nepal 31
NZ - Nuova Zelanda 30
LT - Lituania 29
KZ - Kazakistan 27
ZW - Zimbabwe 26
PE - Perù 25
TN - Tunisia 24
AR - Argentina 23
LB - Libano 23
BG - Bulgaria 22
SI - Slovenia 22
DK - Danimarca 19
HR - Croazia 19
OM - Oman 17
RS - Serbia 17
UG - Uganda 17
CY - Cipro 16
QA - Qatar 15
TZ - Tanzania 15
CM - Camerun 14
SY - Repubblica araba siriana 14
LU - Lussemburgo 13
MW - Malawi 13
SD - Sudan 13
BH - Bahrain 12
BW - Botswana 12
PS - Palestinian Territory 12
ZM - Zambia 12
BY - Bielorussia 11
EC - Ecuador 11
SK - Slovacchia (Repubblica Slovacca) 11
SS - ???statistics.table.value.countryCode.SS??? 10
AL - Albania 9
KW - Kuwait 9
MO - Macao, regione amministrativa speciale della Cina 9
SO - Somalia 8
SC - Seychelles 7
YE - Yemen 7
BO - Bolivia 6
MT - Malta 6
Totale 25.510
Città #
Houston 859
Milan 756
Ashburn 637
Ann Arbor 488
Fairfield 385
Santa Cruz 288
Seattle 263
Wilmington 232
Buffalo 227
Rome 216
Shanghai 209
Woodbridge 190
Montreal 187
Cambridge 180
Dublin 169
Beijing 151
Bengaluru 145
Singapore 139
Paris 131
Shenyang 130
Boardman 129
Taipei 122
Vienna 113
Hanoi 110
Tokyo 110
Mumbai 108
Amsterdam 98
London 97
Kuala Lumpur 95
Hangzhou 94
San Diego 94
Chicago 88
Central 85
Toronto 85
Jakarta 84
Delhi 80
Guangzhou 80
Helsinki 78
Los Angeles 77
Redmond 77
Ottawa 66
New York 65
Chennai 64
Frankfurt am Main 64
Mountain View 64
San Jose 63
Istanbul 62
Melbourne 62
Munich 57
Gurgaon 55
Sydney 55
San Francisco 54
Turin 54
Verona 52
Las Vegas 51
Athens 50
Menlo Park 50
Anzio 49
Wuhan 48
Almere Stad 46
Changsha 46
Dong Ket 46
Dallas 43
Islamabad 42
Pune 42
Seoul 42
Brussels 41
Council Bluffs 41
Duncan 41
Hyderabad 41
Bologna 40
Lagos 40
Ho Chi Minh City 39
Muizenberg 39
Riyadh 39
Stockholm 39
Arlington 38
Central District 38
Zurich 37
Atlanta 36
Washington 36
Baghdad 33
Bangalore 33
Berlin 33
Catania 33
Manchester 33
Nairobi 32
Storm Lake 32
Boulder 30
Kolkata 30
Norwalk 30
Bucharest 29
Cairo 29
Chengdu 28
Madrid 28
Nanjing 28
Phoenix 28
Bernburg 27
Hong Kong 27
Montréal 27
Totale 10.433
Nome #
An Experimental Security Analysis of an Industrial Robot Controller, file e0c31c0c-0c48-4599-e053-1705fe0aef77 1.819
BankSealer: A decision support system for online banking fraud analysis and investigation, file e0c31c0c-2269-4599-e053-1705fe0aef77 1.744
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets, file e0c31c0c-5a7f-4599-e053-1705fe0aef77 1.704
Computer Virus Propagation Models, file e0c31c10-4ba3-4599-e053-1705fe0aef77 1.286
A Natural Language Processing Approach for Financial Fraud Detection, file 74744273-308b-42c7-b888-cb36e891786b 964
ShieldFS: a self-healing, ransomware-aware filesystem, file e0c31c0c-16af-4599-e053-1705fe0aef77 893
Security of controlled manufacturing systems in the connected factory: the case of industrial robots, file e0c31c0c-ed5a-4599-e053-1705fe0aef77 874
Unsupervised Learning Techniques for an Intrusion Detection System, file e0c31c10-36cc-4599-e053-1705fe0aef77 804
Security Evaluation of a Banking Fraud Analysis System, file e0c31c0c-827c-4599-e053-1705fe0aef77 783
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds, file e0c31c0f-357b-4599-e053-1705fe0aef77 720
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network, file e0c31c0d-fcee-4599-e053-1705fe0aef77 719
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network, file e0c31c10-1bbb-4599-e053-1705fe0aef77 704
Measuring and Defeating Anti-Instrumentation-Equipped Malware, file e0c31c0b-c2cb-4599-e053-1705fe0aef77 670
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks, file e0c31c0f-d10a-4599-e053-1705fe0aef77 636
Prometheus: Analyzing WebInject-based information stealers, file e0c31c0c-2cbd-4599-e053-1705fe0aef77 559
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities, file e0c31c0b-4e60-4599-e053-1705fe0aef77 520
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots, file e0c31c0e-09f1-4599-e053-1705fe0aef77 504
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware, file e0c31c12-2823-4599-e053-1705fe0aef77 473
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation, file e0c31c0c-0fc3-4599-e053-1705fe0aef77 460
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis, file e0c31c0e-f4b1-4599-e053-1705fe0aef77 454
A methodology for the repeatable forensic analysis of encrypted drives, file e0c31c10-4ba5-4599-e053-1705fe0aef77 439
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System, file e0c31c0c-2cba-4599-e053-1705fe0aef77 438
GreatEatlon: Fast, Static Detection of Mobile Ransomware, file e0c31c0b-c257-4599-e053-1705fe0aef77 424
Quantum matching pursuit: A quantum algorithm for sparse representations, file e0c31c12-6496-4599-e053-1705fe0aef77 410
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries, file e0c31c0c-09fb-4599-e053-1705fe0aef77 388
Black-box forensic and antiforensic characteristics of solid-state drives, file e0c31c0e-f72c-4599-e053-1705fe0aef77 353
Studying Bluetooth Malware Propagation: the BlueBag Project, file e0c31c0f-d10c-4599-e053-1705fe0aef77 308
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems, file e0c31c11-edfd-4599-e053-1705fe0aef77 300
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems, file e0c31c0c-d116-4599-e053-1705fe0aef77 297
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation, file ea250d5c-7b64-470b-82fc-37d470b2df50 286
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation, file e0c31c10-a6d6-4599-e053-1705fe0aef77 285
Amaretto: An Active Learning Framework for Money Laundering Detection, file e0c31c12-a998-4599-e053-1705fe0aef77 253
Up Close and Personal: Cybersecurity in Medical IoT Devices, file e0c31c0a-39e3-4599-e053-1705fe0aef77 235
On-chip system call tracing: A feasibility study and open prototype, file e0c31c0b-ffc9-4599-e053-1705fe0aef77 221
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS, file a91b6073-455e-49c1-ab66-9c7785bca934 220
SysTaint: Assisting Reversing of Malicious Network Communications, file e0c31c0c-f9c6-4599-e053-1705fe0aef77 211
BitIodine: Extracting Intelligence from the Bitcoin Network, file e0c31c08-274f-4599-e053-1705fe0aef77 208
Behavioral Intrusion Detection, file e0c31c10-4b9c-4599-e053-1705fe0aef77 194
BankSealer: An Online Banking Fraud Analysis and Decision Support System, file e0c31c0c-2266-4599-e053-1705fe0aef77 182
Seeing the Invisible - Forensic Uses of Anomaly Detection and Machine Learning, file e0c31c0f-fdda-4599-e053-1705fe0aef77 181
Open Problems in Computer Virology, file e0c31c10-4a0b-4599-e053-1705fe0aef77 181
Scalable Testing of Mobile Antivirus Applications, file e0c31c0f-d6d1-4599-e053-1705fe0aef77 177
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication, file e0c31c08-274d-4599-e053-1705fe0aef77 171
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth, file e0c31c08-0e37-4599-e053-1705fe0aef77 166
Lessons Learned from the Italian Law on Privacy - Part I, file e0c31c0f-d6ca-4599-e053-1705fe0aef77 161
Security and Trust in the Italian Legal Digital Signature Framework, file e0c31c10-36c3-4599-e053-1705fe0aef77 159
ReCAN – Dataset for reverse engineering of Controller Area Networks, file e0c31c0e-f652-4599-e053-1705fe0aef77 154
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems, file e0c31c0d-ec22-4599-e053-1705fe0aef77 149
Wireless Malware Propagation: A Reality Check, file e0c31c0f-d6cc-4599-e053-1705fe0aef77 142
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN, file 5021e17e-2fc7-4ad4-ba62-4f5a91af3102 135
Trellis: Privilege Separation for Multi-user Applications Made Easy, file e0c31c10-cb36-4599-e053-1705fe0aef77 133
BINO: Automatic Recognition of Inline Binary Functions from Template Classes, file b3685a1e-b3fe-4d49-aff3-26bcbf965b7d 123
Detecting Intrusions through System Call Sequence and Argument Analysis, file e0c31c0f-f133-4599-e053-1705fe0aef77 123
Performance Issues in Video Streaming Environments, file e0c31c10-4c91-4599-e053-1705fe0aef77 117
Apícula: Static Detection of API Calls in Generic Streams of Bytes, file e0c31c12-eb8c-4599-e053-1705fe0aef77 103
Analyzing TCP Traffic Patterns using Self Organizing Maps., file e0c31c10-36c7-4599-e053-1705fe0aef77 100
On the use of different statistical tests for alert correlation - Short Paper, file e0c31c10-4a0c-4599-e053-1705fe0aef77 97
GIVS: Integrity Validation for Grid Security, file e0c31c10-36c4-4599-e053-1705fe0aef77 93
Coming of Age, file 2f805530-f562-4f12-81e9-ab7889bf1571 87
Optimal Number of Nodes for Computations in Grid Enviroments, file e0c31c10-36c5-4599-e053-1705fe0aef77 81
GIVS: Integrity Validation for Grid Security, file e0c31c0f-d6c8-4599-e053-1705fe0aef77 71
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation, file e0c31c0f-c587-4599-e053-1705fe0aef77 70
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks, file 84de863d-40c4-42d6-9ec0-f7244b28ba2b 67
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis, file a8001fd2-e186-4baf-8e10-3fe0b5f480e9 65
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks, file a9eb3ac8-98aa-438e-9872-f6a488226632 57
Evasion Attacks against Banking Fraud Detection Systems, file e0c31c0f-c7ba-4599-e053-1705fe0aef77 57
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services, file e0c31c10-1c0d-4599-e053-1705fe0aef77 57
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning, file e0c31c11-860e-4599-e053-1705fe0aef77 48
Poster: Detecting WebInjects through Live Memory Inspection, file e0c31c0b-25c4-4599-e053-1705fe0aef77 45
Context-Based File Block Classification, file e0c31c11-9352-4599-e053-1705fe0aef77 42
Task Aware Intrusion Detection for Industrial Robots, file 74974e42-4b06-41e9-9ac7-6a6422e04725 39
Quantum algorithms for SVD-based data representation and analysis, file 80af633e-f993-48b7-ad5e-1d1c10ccb289 39
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks, file 32cf1bd0-8995-4819-b57e-98bd3c33067d 34
HACK: a Holistic modeling Approach for Cubesat cyberattacKs, file 62491ff4-e223-4cb3-8495-d22d50ad35b0 26
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment, file a2b4da96-7e82-4d30-b414-02bd4c1f39ca 23
A novel hybrid methodology to secure GOOSE messages against cyberattacks in smart grids, file d24b4f97-8fa8-43bc-a6e7-b4aff41eb259 18
Improving Self Organizing Map Performance for Network Intrusion Detection., file e0c31c10-4c8e-4599-e053-1705fe0aef77 18
Quantum Eigenfaces: Linear Feature Mapping and Nearest Neighbor Classification with Outlier Detection, file 85966e19-6da9-4236-a6a7-aae3d39322b6 16
Remote monitoring of cardiac implanted electronic devices: legal requirements and ethical principles - ESC Regulatory Affairs Committee/EHRA joint task force report, file e0c31c0f-cf21-4599-e053-1705fe0aef77 14
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of “Crypto Wars” in Security Research, file e0c31c0f-2b55-4599-e053-1705fe0aef77 13
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems, file 384e4fad-cad3-4d56-9695-fa5a0d100cfa 7
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies, file 1984f11d-50c0-4cf3-a264-1c5b8dc6760c 5
Quantum matching pursuit: A quantum algorithm for sparse representations, file 2d9952de-8bbb-497b-a178-a53488cd0e09 2
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors, file 62f62629-a578-496d-a44d-733cb28600e6 2
Advancing Fraud Detection Systems through Online Learning, file c257320c-89ae-4d43-ae48-ced821ba0603 2
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners, file e0c31c0f-fdd6-4599-e053-1705fe0aef77 2
Detecting Intrusions through System Call Sequence and Argument Analysis, file e0c31c07-e829-4599-e053-1705fe0aef77 1
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation, file e0c31c08-3830-4599-e053-1705fe0aef77 1
Totale 26.616
Categoria #
all - tutte 39.417
article - articoli 13.798
book - libri 0
conference - conferenze 25.333
curatela - curatele 0
other - altro 0
patent - brevetti 286
selected - selezionate 0
volume - volumi 0
Totale 78.834


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019554 0 0 0 0 0 0 0 0 106 121 160 167
2019/20201.970 125 96 106 164 215 175 158 214 229 162 169 157
2020/20214.356 179 248 278 263 480 347 376 373 497 454 392 469
2021/20226.851 480 348 431 1.056 801 514 462 544 581 417 765 452
2022/20236.183 280 375 1.048 560 427 413 503 428 544 530 557 518
2023/20245.730 488 554 579 611 567 507 1.086 846 492 0 0 0
Totale 26.616