CARMINATI, MICHELE
 Distribuzione geografica
Continente #
EU - Europa 4.169
NA - Nord America 3.695
AS - Asia 3.104
SA - Sud America 461
AF - Africa 178
OC - Oceania 36
Continente sconosciuto - Info sul continente non disponibili 5
Totale 11.648
Nazione #
US - Stati Uniti d'America 3.555
IT - Italia 1.709
RU - Federazione Russa 1.103
SG - Singapore 1.004
CN - Cina 772
BR - Brasile 366
VN - Vietnam 347
DE - Germania 315
KR - Corea 210
FR - Francia 201
GB - Regno Unito 190
JP - Giappone 185
NL - Olanda 143
HK - Hong Kong 140
IN - India 93
CA - Canada 90
ES - Italia 78
FI - Finlandia 71
BE - Belgio 57
TW - Taiwan 54
IE - Irlanda 52
ID - Indonesia 44
MA - Marocco 41
CH - Svizzera 40
AU - Australia 34
TR - Turchia 34
SE - Svezia 33
BD - Bangladesh 32
MX - Messico 32
GR - Grecia 31
PK - Pakistan 31
AR - Argentina 30
AT - Austria 28
CI - Costa d'Avorio 25
IL - Israele 24
UA - Ucraina 24
PL - Polonia 22
ZA - Sudafrica 19
JO - Giordania 16
EC - Ecuador 15
MU - Mauritius 15
PH - Filippine 15
CO - Colombia 14
EG - Egitto 14
IQ - Iraq 14
TH - Thailandia 14
AE - Emirati Arabi Uniti 12
DZ - Algeria 12
CL - Cile 11
KE - Kenya 11
TN - Tunisia 11
CZ - Repubblica Ceca 10
IR - Iran 9
MY - Malesia 9
RO - Romania 9
SA - Arabia Saudita 9
HU - Ungheria 8
PE - Perù 8
PT - Portogallo 8
UZ - Uzbekistan 8
BJ - Benin 7
GH - Ghana 7
VE - Venezuela 7
NP - Nepal 6
CR - Costa Rica 5
EU - Europa 5
SN - Senegal 5
BO - Bolivia 4
DK - Danimarca 4
JM - Giamaica 4
LT - Lituania 4
LU - Lussemburgo 4
MD - Moldavia 4
NO - Norvegia 4
PY - Paraguay 4
AZ - Azerbaigian 3
LV - Lettonia 3
MT - Malta 3
PA - Panama 3
SY - Repubblica araba siriana 3
AL - Albania 2
AO - Angola 2
BG - Bulgaria 2
BY - Bielorussia 2
KG - Kirghizistan 2
KZ - Kazakistan 2
LB - Libano 2
NZ - Nuova Zelanda 2
PS - Palestinian Territory 2
QA - Qatar 2
SK - Slovacchia (Repubblica Slovacca) 2
SV - El Salvador 2
TZ - Tanzania 2
UY - Uruguay 2
BF - Burkina Faso 1
BH - Bahrain 1
BN - Brunei Darussalam 1
BS - Bahamas 1
BW - Botswana 1
CG - Congo 1
Totale 11.634
Città #
Singapore 667
Milan 661
Ashburn 640
San Jose 415
Chandler 267
Hefei 176
Seoul 170
Moscow 158
Tokyo 151
Beijing 135
Santa Clara 133
Fairfield 115
Woodbridge 114
Hong Kong 96
Ho Chi Minh City 94
Hanoi 92
Rome 92
Los Angeles 90
Houston 84
Council Bluffs 78
Dallas 78
Boardman 73
Wilmington 72
Seattle 64
The Dalles 64
Ann Arbor 60
Cambridge 58
Berlin 53
North Charleston 52
Lauterbourg 51
Amsterdam 49
London 48
Dublin 44
New York 44
Brussels 41
Frankfurt am Main 40
Helsinki 39
Orem 34
Ottawa 34
Jakarta 33
Menlo Park 33
São Paulo 31
Buffalo 30
Turin 30
Kiel 29
Paris 27
Redwood City 27
Kent 26
Abidjan 25
Greenford 25
Las Vegas 25
Bergamo 24
Vienna 24
Bari 23
Chennai 23
Dong Ket 23
Taipei 23
Kenitra 22
Nuremberg 22
Salt Lake City 22
Lappeenranta 21
Medford 20
Anzio 18
Chicago 18
Da Nang 18
Florence 18
Lawrence 18
Shanghai 18
Phoenix 16
Amman 15
Athens 15
Casablanca 15
Durango 15
Hangzhou 15
Montreal 15
Toronto 15
Bern 14
Como 14
Málaga 14
Redondo Beach 14
Rose Hill 14
Warsaw 14
Dearborn 13
Zurich 13
Atlanta 12
Bangkok 12
Enschede 12
Guangzhou 12
Haiphong 12
Manchester 12
Oldenburg 12
Rio de Janeiro 12
San Diego 12
Stuttgart 12
Taranto 12
Alexandria 11
Denver 11
Livorno 11
Melbourne 11
Monza 11
Totale 6.540
Nome #
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation 454
Guessing as a service: large language models are not yet ready for vulnerability detection 412
CANnolo: An Anomaly Detection System based on LSTM Autoencoders for Controller Area Network 365
A Systematical and Longitudinal Study of Evasive Behaviors in Windows Malware 357
BankSealer: A decision support system for online banking fraud analysis and investigation 329
Security Evaluation of a Banking Fraud Analysis System 308
Prometheus: Analyzing WebInject-based information stealers 275
PackHero: A Scalable Graph-based Approach for Efficient Packer Identification 274
CopyCAN: An Error-Handling Protocol based Intrusion Detection System for Controller Area Network 273
A Deep Learning Approach for False Data Injection Attacks Detection in Smart Water Infrastructure 267
HAMLET: A Transformer Based Approach for Money Laundering Detection 266
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis 256
Evasion Attacks against Banking Fraud Detection Systems 256
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System 245
Advancing Fraud Detection Systems through Online Learning 237
FraudBuster: Temporal Analysis and Detection of Advanced Financial Frauds 224
CyFence: Securing Cyber-physical Controllers Via Trusted Execution Environment 220
GOLIATH: A Decentralized Framework for Data Collection in Intelligent Transportation Systems 219
Amaretto: An Active Learning Framework for Money Laundering Detection 218
BankSealer: An Online Banking Fraud Analysis and Decision Support System 216
Poster: Detecting WebInjects through Live Memory Inspection 215
Apícula: Static Detection of API Calls in Generic Streams of Bytes 210
BINO: Automatic Recognition of Inline Binary Functions from Template Classes 205
A Natural Language Processing Approach for Financial Fraud Detection 204
Investigating the Impact of Evasion Attacks Against Automotive Intrusion Detection Systems 203
A Federated Learning Platform as a Service for Advancing Stroke Management in European Clinical Centers 199
NoSQL Breakdown: A Large-scale Analysis of Misconfigured NoSQL Services 198
A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications 194
Constrained Concealment Attacks against Reconstruction-based Anomaly Detectors in Industrial Control Systems 194
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation 190
ReCAN – Dataset for reverse engineering of Controller Area Networks 189
CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks 188
CANdito: Improving Payload-Based Detection of Attacks on Controller Area Networks 182
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN 181
Rainfuzz: Reinforcement-Learning Driven Heat-Maps for Boosting Coverage-Guided Fuzzing 179
Amatriciana: Exploiting Temporal GNNs for Robust and Efficient Money Laundering Detection 178
Fraud Detection Under Siege: Practical Poisoning Attacks and Defense Strategies 164
Securing LiDAR Communication through Watermark-based Tampering Detection 163
Poster: FedBlockParadox - A Framework for Simulating and Securing Decentralized Federated Learning 159
Janus: A Trusted Execution Environment Approach for Attack Detection in Industrial Robot Controllers 150
SysTaint: Assisting Reversing of Malicious Network Communications 149
The Good, the Bad, and the Binary: An LSTM-Based Method for Section Boundary Detection in Firmware Analysis 147
Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems 145
Evaluating the Robustness of Automotive Intrusion Detection Systems Against Evasion Attacks 145
Tarallo: Evading Behavioral Malware Detectors in the Problem Space 144
A Secure and Trustworthy Federated Learning Platform as a Service Model for Stroke Management in European Clinical Centers 139
Do You Trust Your Device? Open Challenges in IoT Security Analysis 134
You Might Have Known It Earlier: Analyzing the Role of Underground Forums in Threat Intelligence 132
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors 126
Evaluating the Impact of Privacy-Preserving Federated Learning on CAN Intrusion Detection 124
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations 112
Enhancing CTI Awareness of Small and Medium Enterprises with LLMs and Knowledge Graphs 101
Linux hurt itself in its confusion! Exploiting Out-of-Memory Killer for Confusion Attacks via Heuristic Manipulation 92
Task Aware Intrusion Detection for Industrial Robots 90
SoK: Automated TTP Extraction from CTI Reports – Are We There Yet? 82
Highliner: Enhancing Binary Analysis through NLP-Based Instruction-Level Detection of C++ Inline Functions 74
Assessing the Resilience of Automotive Intrusion Detection Systems to Adversarial Manipulation 72
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems 72
Micro-Mobility Security: A Holistic Approach via Mobile App Analysis 68
A Study on the Security Risks of Model Sharing in Federated Learning Systems 54
SHIELDED: A Network-Aware Approach for Secure and Trustworthy Federated Learning 48
On the (In)Security of Loading Machine Learning Models 44
How Stealthy is Stealthy? Studying the Efficacy of Black-Box Adversarial Attacks in the Real World 37
Swarm: A Distributed Ledger-based Framework to Enhance Air Traffic Control Security Using ADS-B Protocol 35
AutoCVSS: Assessing the Performance of LLMs for Automated Software Vulnerability Scoring 26
Totale 11.808
Categoria #
all - tutte 28.125
article - articoli 9.999
book - libri 0
conference - conferenze 18.126
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 56.250


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021131 0 0 0 0 0 0 0 0 0 53 29 49
2021/2022438 15 37 30 21 69 24 34 27 35 44 36 66
2022/2023777 58 83 78 58 55 76 18 65 107 30 70 79
2023/2024634 30 57 74 80 47 36 39 22 30 106 52 61
2024/20252.061 43 38 86 73 211 85 127 196 413 206 278 305
2025/20266.520 1.015 915 408 616 429 395 988 371 668 715 0 0
Totale 11.808