VISAGGIO, CORRADO AARON
 Distribuzione geografica
Continente #
NA - Nord America 3.614
EU - Europa 2.027
AS - Asia 1.546
SA - Sud America 253
AF - Africa 73
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 7
Totale 7.537
Nazione #
US - Stati Uniti d'America 3.291
CN - Cina 828
UA - Ucraina 805
IT - Italia 412
DE - Germania 379
SG - Singapore 329
CA - Canada 309
BR - Brasile 238
SE - Svezia 150
TR - Turchia 120
IN - India 73
FI - Finlandia 59
FR - Francia 47
CI - Costa d'Avorio 42
HK - Hong Kong 37
IR - Iran 29
RU - Federazione Russa 28
NL - Olanda 27
GB - Regno Unito 26
BE - Belgio 18
EU - Europa 17
PK - Pakistan 17
JP - Giappone 13
VN - Vietnam 13
MY - Malesia 12
PT - Portogallo 12
ID - Indonesia 10
MX - Messico 10
RO - Romania 10
TW - Taiwan 10
SA - Arabia Saudita 9
BD - Bangladesh 8
ES - Italia 8
CZ - Repubblica Ceca 7
KR - Corea 7
AT - Austria 6
EE - Estonia 6
AE - Emirati Arabi Uniti 5
DZ - Algeria 5
EG - Egitto 5
LT - Lituania 5
NG - Nigeria 5
PL - Polonia 5
AR - Argentina 4
AU - Australia 4
AZ - Azerbaigian 4
EC - Ecuador 4
IQ - Iraq 4
PS - Palestinian Territory 4
TN - Tunisia 4
ZA - Sudafrica 4
BG - Bulgaria 3
CH - Svizzera 3
CO - Colombia 3
KE - Kenya 3
MA - Marocco 3
NZ - Nuova Zelanda 3
AL - Albania 2
GR - Grecia 2
IL - Israele 2
KH - Cambogia 2
LU - Lussemburgo 2
NI - Nicaragua 2
PE - Perù 2
UG - Uganda 2
UY - Uruguay 2
BY - Bielorussia 1
CR - Costa Rica 1
CY - Cipro 1
DK - Danimarca 1
IE - Irlanda 1
IS - Islanda 1
JO - Giordania 1
KG - Kirghizistan 1
KZ - Kazakistan 1
MM - Myanmar 1
MN - Mongolia 1
MO - Macao, regione amministrativa speciale della Cina 1
PA - Panama 1
PH - Filippine 1
RS - Serbia 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
Totale 7.537
Città #
Chandler 601
Jacksonville 562
Toronto 290
The Dalles 234
Boardman 227
Nanjing 139
Singapore 135
Princeton 126
Istanbul 116
Wilmington 110
Ann Arbor 79
Ogden 69
Shenyang 63
Helsinki 58
Falkenstein 53
Hebei 49
Nanchang 49
Shanghai 47
Dearborn 45
Jiaxing 43
Abidjan 42
Tianjin 40
Changsha 37
Guangzhou 35
Los Angeles 34
Leawood 30
Bremen 27
Monmouth Junction 27
San Mateo 26
Zhengzhou 26
Hong Kong 23
Beijing 21
Redwood City 21
Ashburn 20
Augusta 20
Rome 20
Naples 19
Frankfurt am Main 18
Milan 18
Brussels 17
Redmond 17
Taizhou 17
Jinan 16
San Giorgio Del Sannio 16
Council Bluffs 14
Seattle 14
Düsseldorf 13
Ningbo 13
Santa Clara 13
Ottawa 12
Ardabil 11
Shenzhen 11
Aversa 10
Norwalk 10
Dallas 9
Islamabad 9
Munich 9
Rio de Janeiro 9
Taipei 9
Fiumefreddo di Sicilia 8
Meppel 8
Mumbai 8
São Paulo 8
Boydton 7
Jeddah 7
London 7
Piedimonte Matese 7
Bucharest 6
Chengdu 6
Mexico City 6
Wuhan 6
Acerra 5
Amsterdam 5
Bandung 5
Bari 5
Brasília 5
Campinas 5
Castellammare di Stabia 5
Curitiba 5
Fairfax 5
Maddaloni 5
Musashino 5
Nantong 5
Portland 5
Rui'an 5
Strasbourg 5
Tallahassee 5
Assago 4
Belo Horizonte 4
Caserta 4
Central 4
Delhi 4
Dresden 4
Ho Chi Minh City 4
Kuala Lumpur 4
Lahore 4
Marcianise 4
Natal 4
Padova 4
Quito 4
Totale 4.064
Nome #
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges 138
A systematic literature review of IoT time series anomaly detection solutions 129
A comparison of static, dynamic, and hybrid analysis for malware detection 126
A Classifier of Malicious Android Applications 94
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts 88
An exploratory study on the evolution of Android malware quality 84
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges 79
A family of experiments to validate metrics for software process models 78
Facing Complexity in IT Competence Development: a Multi-Disciplinary Approach To University-Industry Partnerships 77
Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) 75
Evaluation of BPMN Models Quality - A Family of Experiments 74
Classic cryptanalysis using hidden Markov models 74
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 74
Working in Pairs as a means for Design Knowledge Building: An Empirical Study 73
Detecting Android malware using sequences of system calls 73
Identifying Mobile Repackaged Applications through Formal Methods 73
How can i improve my app? Classifying user reviews for software maintenance and evolution 73
A Three Layered Model To Implement Data Privacy Policies 72
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones 72
Ransomware at X-Rays 72
An empirical study of metric-based methods to detect obfuscated code 71
A study on misclassification of software vulnerabilities when using deep learning and machine learning algorithms 71
Applying a framework for the improvement of software process maturity 70
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications 69
Exploring Mobile User Experience Through Code Quality Metrics 69
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection 69
How distribution affects the success of pair programming 68
Download malware? no, thanks: how formal methods can block update attacks 67
Android apps and user feedback: a dataset for software evolution and quality improvement 67
Pair designing as a practice for enforcing and diffusing design knowledge 66
Composition-Malware: Building Android Malware at Run Time 66
Enhancing online discussion forums with topic-driven content search and assisted posting 66
Demystifying the adoption of behavior-driven development in open source projects 66
Malware detection employed by visualization and deep neural network 66
s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables 65
Identification of Android Malware Families with Model Checking 63
Repadiography: Towards a visual support for triaging repackaged ApPs 63
la misurazione della conoscenza tecnologica nelle organizzazione produttrici di software 62
Confirming the influence of Educational Background in Pair-design Knowledge through Experiments 62
FMESP: Framework for the Modeling and Evaluation of Software Processes 62
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks 61
Tuning anonymity level for assuring high data quality: an empirical study 61
The Impact of Educational Background on Design Knowledge Sharing During Pair Programming: An Empirical Study 61
What would users change in my app? summarizing app reviews for recommending software changes 61
Adversarial deep learning for energy management in buildings 61
Pair Designing as Practice for Enforcing and Diffusing Design Knowledge 60
Towards the definition of a maintainability model for web applications 60
A proposal and empirical validation of metrics to evaluate the maintainability of software process models 60
Performances of Pair Designing on Software Evolution: a controlled experiment 60
Mobile malware detection in the real world 60
Metamorphic Malware Detection Using Code Metrics 59
Building measure-based prediction models for UML class diagram maintainability 59
An Automatic Framework for Detecting Normalization Flaws in Databases 59
FMESP: Framework for the modelling and evaluation of Software Processes 59
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware. 59
Empirical Study on the Productivity of the Pair Programming 59
Empirical Validation of Pair Programming 59
Confirming the influence on educational background in pair-design knowledge through experiments 59
Integrating Software Competences and Managerial Skills from Humanistic Background: a case study on University-Industry Higher Education Programs 58
Enhancing online discussion forums with a topic-driven navigational paradigm: A plugin for the moodle learning management system 58
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware 58
Session Management Vulnerabilities in Today's Web 58
DECA: development emails content analyzer 58
Lessons Learned about Distributed Pair Programmino: What are the Knowledge Needs ? 57
Managing Security Knowledge through Case based Reasoning 57
A decision model supporting cooperative work as an experience package 57
A Test Framework for Assessing Effectiveness of the Data Privacy Policy’s Implementation into Relational Databases 57
An HMM and structural entropy based detector for Android malware: An empirical study 57
Evaluating Mobile Malware by Extracting User Experience-Based Features 56
Full Reuse Maintenance Process for Reducing Software Degradation 56
A set of features to detect web security threats 56
Advanced transcriptase for JavaScript malware 56
Ransomware Steals Your Phone. Formal Methods Rescue It 56
ARdoc: app reviews development oriented classifier 56
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases 56
Dynamic Software Community of Practice through Three-layered Competence Model 55
From Knowledge Management Concepts toward Software Engineering Practices 55
Evaluating advantages of test driven development: a controlled experiment with professionals 55
Investigando los beneficios de Pair Designing: un estudio empírico con profesionales 55
Profiling gas consumption in solidity smart contracts 55
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics 54
WECAP: A Web Environment for Project Planning 54
Lessons learned about distributed pair programming: what are the knowledge needs to address? 54
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications 53
Mobile Malware Detection using Op-code Frequency Histograms. 52
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter 52
FMESP: A Framework for the Modeling and Evalution of Software 51
Clustering for malware classification 51
Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities 51
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis 50
An Empirical Investigation on the Trade-off between Smart Contract Readability and Gas Consumption 49
Detection of Malicious Web Pages Using System Calls Sequences 49
Development Emails Content Analyzer: Intention Mining in Developer Discussions 49
Exploiting Natural Language Structures in Software Informal Documentation 49
About the Robustness and Looseness of Yara Rules 49
Does Enforcing Anonymity Mean Decreasing Data Usefulness? 48
L’Integrazione delle Competenze nelle Relazioni Università-Imprese: un Caso di Studio sulla Gestione dei Knowledge Workers nelle ICT 48
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 48
Patchworking: Exploring the code changes induced by vulnerability fixing activities 48
An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS Projects 47
Totale 6.351
Categoria #
all - tutte 52.328
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 52.328


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202033 0 0 0 0 0 0 0 0 0 0 18 15
2020/20211.268 139 113 12 123 10 257 18 132 35 135 281 13
2021/2022682 17 13 288 66 9 23 36 115 49 18 37 11
2022/20231.752 281 101 45 287 135 289 15 138 263 46 121 31
2023/2024712 57 120 120 31 31 11 33 14 145 46 16 88
2024/20251.812 158 81 88 72 275 155 72 299 228 384 0 0
Totale 7.708