ZANERO, STEFANO
 Distribuzione geografica
Continente #
NA - Nord America 13.138
EU - Europa 9.929
AS - Asia 7.246
SA - Sud America 1.167
AF - Africa 322
OC - Oceania 82
Continente sconosciuto - Info sul continente non disponibili 16
Totale 31.900
Nazione #
US - Stati Uniti d'America 12.746
IT - Italia 3.390
RU - Federazione Russa 2.749
SG - Singapore 2.311
CN - Cina 1.721
BR - Brasile 955
DE - Germania 777
VN - Vietnam 747
JP - Giappone 519
KR - Corea 475
GB - Regno Unito 451
FR - Francia 416
HK - Hong Kong 372
CA - Canada 287
SE - Svezia 279
NL - Olanda 275
FI - Finlandia 256
AT - Austria 244
UA - Ucraina 210
IN - India 202
ES - Italia 168
IE - Irlanda 152
TW - Taiwan 140
CH - Svizzera 133
ID - Indonesia 130
BE - Belgio 97
BD - Bangladesh 90
MA - Marocco 90
GR - Grecia 86
PK - Pakistan 80
TR - Turchia 79
AU - Australia 78
MX - Messico 68
AR - Argentina 67
PL - Polonia 63
CI - Costa d'Avorio 60
JO - Giordania 54
ZA - Sudafrica 43
IL - Israele 37
PH - Filippine 35
NO - Norvegia 34
EC - Ecuador 32
MY - Malesia 32
SA - Arabia Saudita 26
IQ - Iraq 25
EG - Egitto 24
CO - Colombia 23
IR - Iran 23
AE - Emirati Arabi Uniti 21
CZ - Repubblica Ceca 21
TH - Thailandia 21
CL - Cile 20
DZ - Algeria 20
VE - Venezuela 20
TN - Tunisia 19
UZ - Uzbekistan 19
PY - Paraguay 17
RO - Romania 17
KE - Kenya 16
EU - Europa 15
UY - Uruguay 15
HU - Ungheria 13
PE - Perù 13
JM - Giamaica 12
NP - Nepal 12
PT - Portogallo 12
SI - Slovenia 12
AZ - Azerbaigian 11
LT - Lituania 11
LU - Lussemburgo 11
BJ - Benin 10
CR - Costa Rica 8
DK - Danimarca 8
YE - Yemen 8
GH - Ghana 7
PS - Palestinian Territory 7
SN - Senegal 7
BG - Bulgaria 6
LB - Libano 6
LV - Lettonia 6
MD - Moldavia 6
NG - Nigeria 6
AL - Albania 5
BO - Bolivia 5
OM - Oman 5
BY - Bielorussia 4
EE - Estonia 4
KG - Kirghizistan 4
KH - Cambogia 4
KZ - Kazakistan 4
LK - Sri Lanka 4
NZ - Nuova Zelanda 4
RS - Serbia 4
AO - Angola 3
GE - Georgia 3
KW - Kuwait 3
MT - Malta 3
MU - Mauritius 3
PA - Panama 3
QA - Qatar 3
Totale 31.852
Città #
Ashburn 1.684
Singapore 1.474
Milan 1.255
Chandler 1.115
Fairfield 952
San Jose 888
Woodbridge 820
Houston 584
Ann Arbor 457
Wilmington 451
Seattle 430
Tokyo 420
Moscow 402
Santa Clara 396
Seoul 346
Cambridge 334
Hefei 321
Beijing 310
Council Bluffs 262
The Dalles 246
Hong Kong 229
Vienna 223
Los Angeles 220
Boardman 202
Ho Chi Minh City 189
Ottawa 160
Hanoi 154
Lauterbourg 154
Dallas 150
Dearborn 150
Rome 139
Dublin 138
New York 123
Jacksonville 117
Medford 117
Helsinki 113
Lawrence 109
North Charleston 108
London 105
Jakarta 101
São Paulo 93
Berlin 92
Amsterdam 90
Frankfurt am Main 89
Buffalo 87
Dong Ket 76
Redwood City 76
Brussels 70
Taipei 66
Abidjan 60
Orem 59
Las Vegas 58
Málaga 57
Shanghai 55
Amman 53
San Diego 53
Kent 51
Des Moines 49
Zurich 47
Bern 46
Turin 43
Phoenix 42
Guangzhou 41
Warsaw 41
Atlanta 40
Kenitra 39
Nuremberg 39
Montreal 38
Bergamo 37
Casablanca 37
Chicago 37
Lappeenranta 37
Boston 36
Athens 35
Chennai 34
Menlo Park 33
Bresso 32
Rio de Janeiro 32
Columbus 31
Denver 31
Ha Kwai Chung 31
Paris 31
Da Nang 30
Toronto 30
Salt Lake City 29
Bari 28
Manchester 28
Florence 27
Livorno 27
Brooklyn 26
Islamabad 26
Bologna 25
Greenford 25
Kiel 25
Munich 25
Hangzhou 24
Haiphong 23
Natal 23
Norwalk 23
Stockholm 23
Totale 18.739
Nome #
Confidential Computing: A Security Overview and Future Research Directions 1.263
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks 614
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 455
Guessing as a service: large language models are not yet ready for vulnerability detection 412
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network 366
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 357
BankSealer: A decision support system for online banking fraud analysis and investigation 329
HelDroid: Dissecting and Detecting Mobile Ransomware 327
Poster: Using Honeypots to Understand Attacks to Industrial Control Systems 318
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries 313
Extended Abstract: Toward Systematically Exploring Antivirus Engines 310
Security Evaluation of a Banking Fraud Analysis System 308
An Experimental Security Analysis of an Industrial Robot Controller 303
BitIodine: Extracting Intelligence from the Bitcoin Network 292
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth 284
Computer Virus Propagation Models 281
PackHero: A Scalable Graph-based Approach for Efficient Packer Identification 276
HACK: a Holistic modeling Approach for Cubesat cyberattacKs 276
Prometheus: Analyzing WebInject-based information stealers 275
Security of controlled manufacturing systems in the connected factory: the case of industrial robots 275
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network 274
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure 268
HAMLET: A Transformer Based Approach for Money Laundering Detection 266
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis 256
Evasion Attacks against Banking Fraud Detection Systems 256
Black-box forensic and antiforensic characteristics of solid-state drives 250
A Fast Eavesdropping Attack Against Touchscreens 249
Characterizing Background Noise in ICS Traffic Through a Set of Low Interaction Honeypots 247
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System 246
CANter: data-link layer detection of drop-and-spoof attacks on CAN and CAN FD 243
Advancing Fraud Detection Systems through Online Learning 237
Detecting Intrusions through System Call Sequence and Argument Analysis 231
Performance Issues in Video Streaming Environments 228
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets 227
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 225
A Practical Attack Against a KNX-based Building Automation System 222
Measuring and Defeating Anti-Instrumentation-Equipped Malware 222
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 220
BURN: Baring Unknown Rogue Networks 219
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems 219
Amaretto: An Active Learning Framework for Money Laundering Detection 218
A social-engineering-centric data collection initiative to study phishing 217
BankSealer: An Online Banking Fraud Analysis and Decision Support System 217
Poster: Detecting WebInjects through Live Memory Inspection 215
A Natural Language Processing Approach for Financial Fraud Detection 211
A Comprehensive Black-box Methodology for Testing the Forensic Characteristics of Solid-state Drives 211
Protection system and method for protecting a computer system against ransomware attack 211
Apícula: Static Detection of API Calls in Generic Streams of Bytes 211
Unsupervised Learning Techniques for an Intrusion Detection System 207
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 205
Smart Factory Security: A Case Study on a Modular Smart Manufacturing System 205
ShieldFS: a self-healing, ransomware-aware filesystem 204
Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems 203
Studying Bluetooth Malware Propagation: the BlueBag Project 203
GIVS: Integrity Validation for Grid Security 202
Context-Based File Block Classification 201
Sistema di riconoscimento di manomissione del codice di un sistema di controllo mediante uso di processori con memoria trusted 201
Scalable Testing of Mobile Antivirus Applications 198
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 198
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems 194
File Block Classification by Support Vector Machines 193
Optimal Number of Nodes for Computations in Grid Enviroments 192
A novel methodology to validate cyberattacks and evaluate their impact on power systems using real time digital simulation 191
Trellis: Privilege Separation for Multi-user Applications Made Easy 191
A novel hybrid cybersecurity scheme against false data injection attacks in automated power systems 190
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation 190
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 189
ReCAN – Dataset for reverse engineering of Controller Area Networks 189
Behavioral Intrusion Detection 188
Security and Trust in the Italian Legal Digital Signature Framework 187
DETECTING UNSECURE DATA FLOW IN AUTOMATION TASK PROGRAMS 187
All your face are belong to us: breaking Facebook's social authentication 184
Reducing False Positives In Anomaly Detectors Through Fuzzy Alert Aggregation 183
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks 182
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities 182
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN 181
Measuring and Defeating Anti-Instrumentation-Equipped Malware 180
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 179
AndRadar: Fast Discovery of Android Applications in Alternative Markets 179
Analyzing TCP Traffic Patterns using Self Organizing Maps. 178
Amatriciana: Exploiting Temporal GNNs for Robust and Efficient Money Laundering Detection 178
On the use of different statistical tests for alert correlation - Short Paper 174
Quantum algorithms for SVD-based data representation and analysis 173
Selecting and Improving System Call Models for Anomaly Detection 172
A methodology for the repeatable forensic analysis of encrypted drives 171
Detecting Insecure Code Patterns in Industrial Robot Programs 171
Lessons Learned from the Italian Law on Privacy - Part I 170
Lines of malicious code: insights into the malicious software industry 170
Effective multimodel anomaly detection using cooperative negotiation 170
Open Problems in Computer Virology 169
2011 First SysSec Workshop (SysSec 2011) 166
GreatEatlon: Fast, Static Detection of Mobile Ransomware 166
Finding Non-trivial Malware Naming Inconsistencies 165
Securing LiDAR Communication through Watermark-based Tampering Detection 164
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 164
Open Source Software for Digital Forensics 164
GIVS: Integrity Validation for Grid Security 164
COMPUTER-IMPLEMENTED REAL-TIME CONTROL SYSTEM FOR CONTROLLING A PHYSICAL SYSTEM OR DEVICE 161
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning 160
When Cyber Got Real: Challenges in Securing Cyber-Physical Systems 160
Totale 23.638
Categoria #
all - tutte 80.886
article - articoli 21.423
book - libri 0
conference - conferenze 55.485
curatela - curatele 1.442
other - altro 0
patent - brevetti 1.879
selected - selezionate 0
volume - volumi 657
Totale 161.772


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021384 0 0 0 0 0 0 0 0 0 0 140 244
2021/20221.656 60 161 119 91 258 94 80 110 105 99 171 308
2022/20232.406 220 286 262 244 177 257 52 185 300 107 177 139
2023/20241.552 89 209 145 158 139 131 93 72 53 220 92 151
2024/20254.860 99 96 206 185 706 291 249 500 805 386 646 691
2025/202614.168 2.399 2.191 823 1.234 904 982 2.059 807 1.261 1.503 5 0
Totale 32.232