CARMINATI, MICHELE
 Distribuzione geografica
Continente #
EU - Europa 3.541
NA - Nord America 2.578
AS - Asia 1.937
SA - Sud America 401
AF - Africa 114
OC - Oceania 22
Continente sconosciuto - Info sul continente non disponibili 5
Totale 8.598
Nazione #
US - Stati Uniti d'America 2.478
IT - Italia 1.422
RU - Federazione Russa 1.098
SG - Singapore 774
CN - Cina 550
BR - Brasile 333
DE - Germania 245
VN - Vietnam 120
FR - Francia 116
GB - Regno Unito 115
NL - Olanda 115
KR - Corea 83
ES - Italia 69
CA - Canada 67
FI - Finlandia 66
HK - Hong Kong 64
IN - India 59
JP - Giappone 54
IE - Irlanda 47
BE - Belgio 38
TW - Taiwan 37
ID - Indonesia 36
CH - Svizzera 35
SE - Svezia 33
GR - Grecia 27
AT - Austria 26
CI - Costa d'Avorio 25
TR - Turchia 24
UA - Ucraina 23
PK - Pakistan 21
AR - Argentina 20
AU - Australia 20
IL - Israele 20
MA - Marocco 18
MX - Messico 18
BD - Bangladesh 17
JO - Giordania 15
EC - Ecuador 13
EG - Egitto 13
PL - Polonia 13
ZA - Sudafrica 13
CO - Colombia 12
TN - Tunisia 10
AE - Emirati Arabi Uniti 9
DZ - Algeria 9
CZ - Repubblica Ceca 8
IR - Iran 8
KE - Kenya 8
PH - Filippine 8
RO - Romania 8
BJ - Benin 7
IQ - Iraq 7
SA - Arabia Saudita 7
CL - Cile 5
CR - Costa Rica 5
EU - Europa 5
HU - Ungheria 5
MY - Malesia 5
PE - Perù 5
PT - Portogallo 5
SN - Senegal 5
TH - Thailandia 5
UZ - Uzbekistan 5
VE - Venezuela 5
BO - Bolivia 4
DK - Danimarca 4
LU - Lussemburgo 4
NO - Norvegia 4
LV - Lettonia 3
PA - Panama 3
AO - Angola 2
BY - Bielorussia 2
JM - Giamaica 2
LT - Lituania 2
MD - Moldavia 2
MT - Malta 2
NZ - Nuova Zelanda 2
PY - Paraguay 2
SV - El Salvador 2
UY - Uruguay 2
AZ - Azerbaigian 1
BG - Bulgaria 1
BH - Bahrain 1
BN - Brunei Darussalam 1
BS - Bahamas 1
BW - Botswana 1
EE - Estonia 1
GE - Georgia 1
GH - Ghana 1
IS - Islanda 1
KG - Kirghizistan 1
KH - Cambogia 1
KN - Saint Kitts e Nevis 1
KZ - Kazakistan 1
QA - Qatar 1
SD - Sudan 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TT - Trinidad e Tobago 1
ZM - Zambia 1
Totale 8.598
Città #
Singapore 503
Milan 486
Ashburn 478
Chandler 267
Hefei 172
Moscow 157
Santa Clara 123
Fairfield 115
Woodbridge 114
Beijing 110
Houston 80
Rome 80
Wilmington 72
Boardman 70
Ann Arbor 60
Los Angeles 60
Cambridge 57
Seattle 52
Seoul 52
Berlin 51
Hong Kong 49
Dallas 44
Council Bluffs 41
London 41
Dublin 39
Helsinki 35
Amsterdam 33
Menlo Park 33
Ottawa 33
Tokyo 32
New York 31
Turin 30
Ho Chi Minh City 28
Jakarta 28
Redwood City 27
Frankfurt am Main 26
Kent 26
Abidjan 25
Brussels 25
São Paulo 25
Buffalo 23
Dong Ket 23
Bergamo 22
Vienna 22
Hanoi 21
Lappeenranta 20
Medford 20
Paris 20
Anzio 18
Bari 18
Lawrence 18
Nuremberg 17
Shanghai 17
Casablanca 15
Durango 15
Amman 14
Bern 14
Chennai 14
Como 14
Málaga 14
Redondo Beach 14
Athens 13
Chicago 13
Dearborn 13
Stuttgart 12
Taranto 12
The Dalles 12
Toronto 12
Alexandria 11
Florence 11
Orem 11
Phoenix 11
Rio de Janeiro 11
San Diego 11
Bologna 10
Boydton 10
Montreal 10
Munich 10
Oldenburg 10
Taipei 10
Bresso 9
Cagliari 9
Livorno 9
Sydney 9
Uta 9
Columbus 8
Denver 8
Enschede 8
Laurel 8
Madrid 8
Melzo 8
Monza 8
Nairobi 8
Norwalk 8
Recife 8
San Jose 8
Stockholm 8
Zurich 8
Belo Horizonte 7
Brescia 7
Totale 4.559
Nome #
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 416
Guessing as a service: large language models are not yet ready for vulnerability detection 287
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network 287
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 283
Prometheus: Analyzing WebInject-based information stealers 248
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network 246
BankSealer: A decision support system for online banking fraud analysis and investigation 240
Security Evaluation of a Banking Fraud Analysis System 227
HAMLET: A Transformer Based Approach for Money Laundering Detection 222
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System 217
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis 215
Evasion Attacks against Banking Fraud Detection Systems 209
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure 208
Advancing Fraud Detection Systems through Online Learning 206
PackHero: A Scalable Graph-based Approach for Efficient Packer Identification 198
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems 196
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 190
BankSealer: An Online Banking Fraud Analysis and Decision Support System 180
Poster: Detecting WebInjects through Live Memory Inspection 176
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 173
Amaretto: An Active Learning Framework for Money Laundering Detection 168
ReCAN – Dataset for reverse engineering of Controller Area Networks 167
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 166
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems 163
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 151
Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems 148
A Natural Language Processing Approach for Financial Fraud Detection 148
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 147
Apícula: Static Detection of API Calls in Generic Streams of Bytes 145
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 138
Amatriciana: Exploiting Temporal GNNs for Robust and Efficient Money Laundering Detection 134
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN 131
A Federated Learning Platform as a Service for Advancing Stroke Management in European Clinical Centers 129
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation 128
Securing LiDAR Communication through Watermark-based Tampering Detection 125
SysTaint: Assisting Reversing of Malicious Network Communications 125
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks 122
A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications 121
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 120
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis 119
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers 119
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks 119
Tarallo: Evading Behavioral Malware Detectors in the Problem Space 115
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning 114
Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems 107
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence 105
Do You Trust Your Device? Open Challenges in IoT Security Analysis 93
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection 88
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 78
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations 78
Task Aware Intrusion Detection for Industrial Robots 70
SoK: Automated TTP Extraction from CTI Reports – Are We There Yet? 44
Highliner: Enhancing Binary Analysis through NLP-Based Instruction-Level Detection of C++ Inline Functions 44
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems 37
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation 34
Micro-Mobility Security: A Holistic Approach via Mobile App Analysis 34
Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation 21
SHIELDED: A Network-Aware Approach for Secure and Trustworthy Federated Learning 13
Swarm: A Distributed Ledger-based Framework to Enhance Air Traffic Control Security Using ADS-B Protocol 12
AutoCVSS: Assessing the Performance of LLMs for Automated Software Vulnerability Scoring 5
How Stealthy is Stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World 3
Totale 8.752
Categoria #
all - tutte 23.730
article - articoli 8.549
book - libri 0
conference - conferenze 15.181
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 47.460


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021311 0 0 0 0 0 67 29 50 34 53 29 49
2021/2022438 15 37 30 21 69 24 34 27 35 44 36 66
2022/2023777 58 83 78 58 55 76 18 65 107 30 70 79
2023/2024634 30 57 74 80 47 36 39 22 30 106 52 61
2024/20252.061 43 38 86 73 211 85 127 196 413 206 278 305
2025/20263.464 1.015 915 408 616 429 81 0 0 0 0 0 0
Totale 8.752