ZANERO, STEFANO
 Distribuzione geografica
Continente #
NA - Nord America 8.417
EU - Europa 4.557
AS - Asia 1.316
AF - Africa 82
SA - Sud America 49
OC - Oceania 27
Continente sconosciuto - Info sul continente non disponibili 16
Totale 14.464
Nazione #
US - Stati Uniti d'America 8.194
IT - Italia 2.292
SG - Singapore 413
DE - Germania 389
SE - Svezia 256
CN - Cina 240
AT - Austria 222
CA - Canada 213
GB - Regno Unito 204
FI - Finlandia 202
UA - Ucraina 186
VN - Vietnam 137
IE - Irlanda 131
FR - Francia 123
ES - Italia 117
NL - Olanda 108
ID - Indonesia 94
CH - Svizzera 91
GR - Grecia 64
IN - India 64
KR - Corea 64
JP - Giappone 56
BE - Belgio 49
CI - Costa d'Avorio 42
JO - Giordania 39
TW - Taiwan 37
RU - Federazione Russa 34
BR - Brasile 31
TR - Turchia 31
HK - Hong Kong 29
PK - Pakistan 27
AU - Australia 24
IL - Israele 21
MY - Malesia 17
EU - Europa 15
CZ - Repubblica Ceca 14
PH - Filippine 14
PL - Polonia 13
BJ - Benin 10
NO - Norvegia 10
IR - Iran 9
RO - Romania 9
HU - Ungheria 8
LU - Lussemburgo 8
AE - Emirati Arabi Uniti 7
CO - Colombia 7
DK - Danimarca 6
PT - Portogallo 6
TN - Tunisia 6
ZA - Sudafrica 5
AZ - Azerbaigian 4
BD - Bangladesh 4
EG - Egitto 4
MX - Messico 4
PY - Paraguay 4
SN - Senegal 4
BG - Bulgaria 3
CR - Costa Rica 3
NG - Nigeria 3
NZ - Nuova Zelanda 3
PE - Perù 3
RS - Serbia 3
CL - Cile 2
EE - Estonia 2
KH - Cambogia 2
LK - Sri Lanka 2
LS - Lesotho 2
LT - Lituania 2
MA - Marocco 2
MD - Moldavia 2
MU - Mauritius 2
PA - Panama 2
SA - Arabia Saudita 2
AP - ???statistics.table.value.countryCode.AP??? 1
AR - Argentina 1
CY - Cipro 1
EC - Ecuador 1
GT - Guatemala 1
KE - Kenya 1
KW - Kuwait 1
KZ - Kazakistan 1
LV - Lettonia 1
MT - Malta 1
SC - Seychelles 1
SI - Slovenia 1
Totale 14.464
Città #
Chandler 1.115
Fairfield 952
Woodbridge 820
Milan 632
Houston 570
Ashburn 476
Ann Arbor 455
Wilmington 447
Seattle 408
Santa Clara 354
Cambridge 331
Singapore 282
Vienna 211
Boardman 177
Ottawa 155
Dearborn 150
Dublin 121
Jacksonville 115
Medford 115
Lawrence 109
Helsinki 88
Jakarta 87
Berlin 84
Rome 84
Dong Ket 76
Redwood City 76
Beijing 63
Málaga 56
San Diego 52
Amsterdam 47
Bern 45
Brussels 44
Abidjan 42
Des Moines 42
New York 40
Amman 39
London 39
Shanghai 35
Turin 35
Menlo Park 32
Bergamo 30
Bresso 29
Zurich 28
Athens 27
Lappeenranta 25
Livorno 25
Boston 24
Taipei 24
Los Angeles 23
Norwalk 23
Pavia 22
Phoenix 22
Como 20
Arezzo 19
Anzio 18
Bari 17
Durango 17
Palermo 17
Tokyo 17
Washington 17
Bologna 16
Frankfurt am Main 16
Islamabad 16
Madrid 16
Seoul 16
Toronto 16
Montefiorino 14
Montreal 14
Santa Barbara 14
Taranto 14
Cologne 13
Monza 13
Atlanta 12
Catania 12
Falls Church 12
Manila 12
Redmond 12
San Jose 12
Stuttgart 12
Verona 12
Lucca 11
Paris 11
São Paulo 11
Brescia 10
Chicago 10
Cotonou 10
Melzo 10
Munich 10
Torino 10
Enschede 9
Guangzhou 9
Padova 9
Seongnam 9
Stockholm 9
Anaheim 8
Ancona 8
Boydton 8
Cagliari 8
Orlando 8
Abbiategrasso 7
Totale 10.004
Nome #
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 328
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks 295
HelDroid: Dissecting and Detecting Mobile Ransomware 272
Confidential Computing: A Security Overview and Future Research Directions 240
Extended Abstract: Toward Systematically Exploring Antivirus Engines 220
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems 217
Prometheus: Analyzing WebInject-based information stealers 199
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network 191
Security of controlled manufacturing systems in the connected factory: the case of industrial robots 190
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network 179
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 176
An Experimental Security Analysis of an Industrial Robot Controller 172
Black-box forensic and antiforensic characteristics of solid-state drives 170
BankSealer: A decision support system for online banking fraud analysis and investigation 166
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 165
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots 158
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth 156
Security Evaluation of a Banking Fraud Analysis System 156
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System 154
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 151
A Fast Eavesdropping Attack Against Touchscreens 148
Computer Virus Propagation Models 145
Performance Issues in Video Streaming Environments 144
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis 142
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets 135
BitIodine: Extracting Intelligence from the Bitcoin Network 135
Studying Bluetooth Malware Propagation: the BlueBag Project 131
Protection system and method for protecting a computer system against ransomware attack 129
Sistema di riconoscimento di manomissione del codice di un sistema di controllo mediante uso di processori con memoria trusted 129
Measuring and Defeating Anti-Instrumentation-Equipped Malware 128
Context-Based File Block Classification 127
File Block Classification by Support Vector Machines 126
A social-engineering-centric data collection initiative to study phishing 125
Behavioral Intrusion Detection 124
GIVS: Integrity Validation for Grid Security 124
BURN: Baring Unknown Rogue Networks 124
A Practical Attack Against a KNX-based Building Automation System 122
BankSealer: An Online Banking Fraud Analysis and Decision Support System 120
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation 120
Scalable Testing of Mobile Antivirus Applications 120
ReCAN – Dataset for reverse engineering of Controller Area Networks 119
ShieldFS: a self-healing, ransomware-aware filesystem 118
Cyber-Physical Systems 118
Evasion Attacks against Banking Fraud Detection Systems 118
Lessons learned from the Italian law on privacy – Part II 118
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems 118
HAMLET: A Transformer Based Approach for Money Laundering Detection 117
Security and Trust in the Italian Legal Digital Signature Framework 116
Up Close and Personal: Cybersecurity in Medical IoT Devices 116
Optimal Number of Nodes for Computations in Grid Enviroments 115
Analyzing TCP Traffic Patterns using Self Organizing Maps. 115
Selecting and Improving System Call Models for Anomaly Detection 115
Poster: Detecting WebInjects through Live Memory Inspection 115
Trellis: Privilege Separation for Multi-user Applications Made Easy 115
Unsupervised Learning Techniques for an Intrusion Detection System 114
Detecting Intrusions through System Call Sequence and Argument Analysis 114
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 114
Open Source Software for Digital Forensics 113
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services 113
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives 112
AndRadar: Fast Discovery of Android Applications in Alternative Markets 111
Lessons Learned from the Italian Law on Privacy - Part I 109
Effective multimodel anomaly detection using cooperative negotiation 109
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities 109
GIVS: Integrity Validation for Grid Security 108
Lines of malicious code: insights into the malicious software industry 106
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners 106
Measuring and Defeating Anti-Instrumentation-Equipped Malware 105
Open Problems in Computer Virology 104
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems 103
CANter: data-link layer detection of drop-and-spoof attacks on CAN and CAN FD 98
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication 98
GreatEatlon: Fast, Static Detection of Mobile Ransomware 96
Unsupervised Learning Algorithms for Intrusion Detection 95
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS 95
Finding Non-trivial Malware Naming Inconsistencies 95
Advancing Fraud Detection Systems through Online Learning 94
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System 94
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems 92
All your face are belong to us: breaking Facebook's social authentication 91
ZARATHUSTRA: Extracting Webinject signatures from banking trojans 91
Integrated Detection of Attacks Against Browsers, Web Applications and Databases 90
Wireless Malware Propagation: A Reality Check 90
On-chip system call tracing: A feasibility study and open prototype 90
BlueBat: Towards Practical Bluetooth Honeypots 89
Network access control 87
Identifying Dormant Functionality in Malware Programs 86
Amaretto: An Active Learning Framework for Money Laundering Detection 86
Practical Exploit Generation for Intent Message Vulnerabilities in Android 85
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of “Crypto Wars” in Security Research 84
The Case for Open Source Software in Digital Forensics 83
2011 First SysSec Workshop (SysSec 2011) 82
A methodology for the repeatable forensic analysis of encrypted drives 79
ULISSE: A Network Intrusion Detection System 78
Integrating Partial Models of Network Normality via Cooperative Negotiation - An Approach to Development of Multiagent Intrusion Detection Systems 76
Quantum matching pursuit: A quantum algorithm for sparse representations 76
SysTaint: Assisting Reversing of Malicious Network Communications 75
System Security research at Politecnico di Milano 74
Detecting Insecure Code Patterns in Industrial Robot Programs 74
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation 74
Totale 12.533
Categoria #
all - tutte 45.593
article - articoli 12.555
book - libri 0
conference - conferenze 30.569
curatela - curatele 930
other - altro 0
patent - brevetti 1.089
selected - selezionate 0
volume - volumi 450
Totale 91.186


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20201.537 0 0 0 0 0 314 281 239 254 114 217 118
2020/20211.795 103 135 73 108 271 153 86 145 158 179 140 244
2021/20221.656 60 161 119 91 258 94 80 110 105 99 171 308
2022/20232.406 220 286 262 244 177 257 52 185 300 107 177 139
2023/20241.552 89 209 145 158 139 131 93 72 53 220 92 151
2024/20251.540 99 96 206 185 706 248 0 0 0 0 0 0
Totale 14.744