ZANERO, STEFANO
 Distribuzione geografica
Continente #
NA - Nord America 7.759
EU - Europa 4.136
AS - Asia 697
AF - Africa 66
SA - Sud America 45
OC - Oceania 23
Continente sconosciuto - Info sul continente non disponibili 16
Totale 12.742
Nazione #
US - Stati Uniti d'America 7.540
IT - Italia 2.070
DE - Germania 349
SE - Svezia 244
CA - Canada 209
AT - Austria 206
GB - Regno Unito 196
UA - Ucraina 186
FI - Finlandia 176
CN - Cina 175
VN - Vietnam 137
IE - Irlanda 129
ES - Italia 109
FR - Francia 100
NL - Olanda 76
CH - Svizzera 74
SG - Singapore 70
GR - Grecia 63
IN - India 53
BE - Belgio 48
KR - Corea 43
CI - Costa d'Avorio 42
JO - Giordania 39
JP - Giappone 37
TR - Turchia 29
BR - Brasile 28
RU - Federazione Russa 28
AU - Australia 21
IL - Israele 18
MY - Malesia 17
PK - Pakistan 17
EU - Europa 15
HK - Hong Kong 13
PL - Polonia 13
TW - Taiwan 13
CZ - Repubblica Ceca 12
ID - Indonesia 9
IR - Iran 9
RO - Romania 9
LU - Lussemburgo 8
AE - Emirati Arabi Uniti 7
CO - Colombia 7
HU - Ungheria 7
NO - Norvegia 7
DK - Danimarca 6
PT - Portogallo 6
TN - Tunisia 6
EG - Egitto 4
MX - Messico 4
PY - Paraguay 4
SN - Senegal 4
BD - Bangladesh 3
BG - Bulgaria 3
CR - Costa Rica 3
PE - Perù 3
RS - Serbia 3
ZA - Sudafrica 3
CL - Cile 2
EE - Estonia 2
LK - Sri Lanka 2
LS - Lesotho 2
LT - Lituania 2
MU - Mauritius 2
NZ - Nuova Zelanda 2
PA - Panama 2
SA - Arabia Saudita 2
AP - ???statistics.table.value.countryCode.AP??? 1
CY - Cipro 1
EC - Ecuador 1
GT - Guatemala 1
KE - Kenya 1
KW - Kuwait 1
KZ - Kazakistan 1
LV - Lettonia 1
MD - Moldavia 1
MT - Malta 1
NG - Nigeria 1
PH - Filippine 1
SC - Seychelles 1
SI - Slovenia 1
Totale 12.742
Città #
Chandler 1.115
Fairfield 952
Woodbridge 820
Houston 570
Milan 530
Ashburn 462
Ann Arbor 455
Wilmington 447
Seattle 407
Cambridge 327
Vienna 200
Ottawa 155
Dearborn 150
Dublin 120
Jacksonville 115
Medford 115
Lawrence 109
Berlin 81
Rome 77
Dong Ket 76
Helsinki 76
Redwood City 76
Beijing 59
Málaga 56
San Diego 52
Bern 45
Brussels 43
Abidjan 42
Des Moines 40
Amman 39
London 36
Menlo Park 32
Shanghai 31
New York 30
Bergamo 29
Bresso 29
Athens 27
Turin 27
Amsterdam 25
Livorno 25
Boardman 24
Boston 23
Norwalk 23
Pavia 22
Phoenix 22
Como 20
Arezzo 19
Anzio 18
Singapore 18
Durango 17
Palermo 17
Washington 17
Toronto 16
Bologna 15
Los Angeles 14
Montefiorino 14
Montreal 14
Santa Barbara 14
Taranto 14
Cologne 13
Zurich 13
Bari 12
Catania 12
Falls Church 12
Stuttgart 12
Verona 12
Lappeenranta 11
Lucca 11
Madrid 11
Redmond 11
Atlanta 10
Chicago 10
Melzo 10
Paris 10
Seoul 10
Taipei 10
Torino 10
Brescia 9
Islamabad 9
Munich 9
Seongnam 9
São Paulo 9
Tokyo 9
Anaheim 8
Ancona 8
Boydton 8
Enschede 8
Guangzhou 8
Padova 8
San Jose 8
Cagliari 7
Cortenuova 7
Dallas 7
Edinburgh 7
Gravina di Catania 7
Laurel 7
Rho 7
Siena 7
Warsaw 7
Alserio 6
Totale 8.822
Nome #
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 311
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks 279
HelDroid: Dissecting and Detecting Mobile Ransomware 268
Extended Abstract: Toward Systematically Exploring Antivirus Engines 206
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems 200
Prometheus: Analyzing WebInject-based information stealers 189
Security of controlled manufacturing systems in the connected factory: the case of industrial robots 181
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network 176
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network 171
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 169
Black-box forensic and antiforensic characteristics of solid-state drives 157
BankSealer: A decision support system for online banking fraud analysis and investigation 155
An Experimental Security Analysis of an Industrial Robot Controller 152
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 151
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots 149
Security Evaluation of a Banking Fraud Analysis System 148
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth 143
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System 142
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 142
A Fast Eavesdropping Attack Against Touchscreens 136
Computer Virus Propagation Models 135
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis 130
Performance Issues in Video Streaming Environments 129
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets 128
Studying Bluetooth Malware Propagation: the BlueBag Project 127
Protection system and method for protecting a computer system against ransomware attack 123
Behavioral Intrusion Detection 121
A social-engineering-centric data collection initiative to study phishing 118
Measuring and Defeating Anti-Instrumentation-Equipped Malware 118
BitIodine: Extracting Intelligence from the Bitcoin Network 118
File Block Classification by Support Vector Machines 117
Sistema di riconoscimento di manomissione del codice di un sistema di controllo mediante uso di processori con memoria trusted 117
BURN: Baring Unknown Rogue Networks 116
Context-Based File Block Classification 116
Scalable Testing of Mobile Antivirus Applications 115
Lessons learned from the Italian law on privacy – Part II 115
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation 113
Up Close and Personal: Cybersecurity in Medical IoT Devices 113
Cyber-Physical Systems 113
Security and Trust in the Italian Legal Digital Signature Framework 112
GIVS: Integrity Validation for Grid Security 112
ReCAN – Dataset for reverse engineering of Controller Area Networks 111
Trellis: Privilege Separation for Multi-user Applications Made Easy 111
Analyzing TCP Traffic Patterns using Self Organizing Maps. 110
BankSealer: An Online Banking Fraud Analysis and Decision Support System 109
A Practical Attack Against a KNX-based Building Automation System 109
ShieldFS: a self-healing, ransomware-aware filesystem 109
Poster: Detecting WebInjects through Live Memory Inspection 109
Unsupervised Learning Techniques for an Intrusion Detection System 107
Open Source Software for Digital Forensics 107
AndRadar: Fast Discovery of Android Applications in Alternative Markets 107
Detecting Intrusions through System Call Sequence and Argument Analysis 106
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems 106
Selecting and Improving System Call Models for Anomaly Detection 105
Evasion Attacks against Banking Fraud Detection Systems 105
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners 103
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 103
Lessons Learned from the Italian Law on Privacy - Part I 102
Optimal Number of Nodes for Computations in Grid Enviroments 100
Open Problems in Computer Virology 100
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems 100
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives 99
Measuring and Defeating Anti-Instrumentation-Equipped Malware 99
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities 98
GIVS: Integrity Validation for Grid Security 98
Lines of malicious code: insights into the malicious software industry 96
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication 94
Effective multimodel anomaly detection using cooperative negotiation 91
Unsupervised Learning Algorithms for Intrusion Detection 90
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System 89
Wireless Malware Propagation: A Reality Check 88
GreatEatlon: Fast, Static Detection of Mobile Ransomware 88
BlueBat: Towards Practical Bluetooth Honeypots 87
All your face are belong to us: breaking Facebook's social authentication 86
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS 86
Finding Non-trivial Malware Naming Inconsistencies 86
ZARATHUSTRA: Extracting Webinject signatures from banking trojans 83
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems 83
Integrated Detection of Attacks Against Browsers, Web Applications and Databases 82
Practical Exploit Generation for Intent Message Vulnerabilities in Android 82
On-chip system call tracing: A feasibility study and open prototype 82
Network access control 80
Why Offensive Security Needs Engineering Textbooks: Or, How to Avoid a Replay of “Crypto Wars” in Security Research 78
Identifying Dormant Functionality in Malware Programs 78
The Case for Open Source Software in Digital Forensics 77
Amaretto: An Active Learning Framework for Money Laundering Detection 76
ULISSE: A Network Intrusion Detection System 75
2011 First SysSec Workshop (SysSec 2011) 75
A methodology for the repeatable forensic analysis of encrypted drives 74
Stranger Danger: Exploring the Ecosystem of Ad-based URL Shortening Services 72
System Security research at Politecnico di Milano 71
Phoenix: DGA-Based Botnet Tracking and Intelligence 70
HAMLET: A Transformer Based Approach for Money Laundering Detection 69
Proceedings of EC2ND 2009, European Conference on Computer Networks Defence 69
Integrating Partial Models of Network Normality via Cooperative Negotiation - An Approach to Development of Multiagent Intrusion Detection Systems 69
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications 68
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation 68
SysTaint: Assisting Reversing of Malicious Network Communications 68
Seeing the Invisible - Forensic Uses of Anomaly Detection and Machine Learning 67
On the use of different statistical tests for alert correlation - Short Paper 65
Totale 11.406
Categoria #
all - tutte 35.801
article - articoli 10.054
book - libri 0
conference - conferenze 23.814
curatela - curatele 748
other - altro 0
patent - brevetti 844
selected - selezionate 0
volume - volumi 341
Totale 71.602


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019573 0 0 0 0 0 0 0 0 0 0 304 269
2019/20202.435 126 160 89 222 301 314 281 239 254 114 217 118
2020/20211.795 103 135 73 108 271 153 86 145 158 179 140 244
2021/20221.656 60 161 119 91 258 94 80 110 105 99 171 308
2022/20232.406 220 286 262 244 177 257 52 185 300 107 177 139
2023/20241.359 89 209 145 158 139 131 93 72 53 220 50 0
Totale 13.011