VISAGGIO, CORRADO AARON
 Distribuzione geografica
Continente #
NA - Nord America 4.472
AS - Asia 2.531
EU - Europa 2.292
SA - Sud America 443
AF - Africa 85
Continente sconosciuto - Info sul continente non disponibili 18
OC - Oceania 8
Totale 9.849
Nazione #
US - Stati Uniti d'America 4.107
CN - Cina 1.039
UA - Ucraina 809
SG - Singapore 769
DE - Germania 462
IT - Italia 452
BR - Brasile 397
CA - Canada 327
SE - Svezia 161
KR - Corea 143
TR - Turchia 129
IN - India 93
FR - Francia 89
HK - Hong Kong 82
VN - Vietnam 79
FI - Finlandia 68
GB - Regno Unito 49
CI - Costa d'Avorio 43
RU - Federazione Russa 36
IR - Iran 30
NL - Olanda 29
PL - Polonia 29
MX - Messico 26
PK - Pakistan 25
ES - Italia 21
JP - Giappone 20
BD - Bangladesh 19
BE - Belgio 18
AR - Argentina 17
EU - Europa 17
ID - Indonesia 14
SA - Arabia Saudita 14
MY - Malesia 12
PT - Portogallo 12
CZ - Repubblica Ceca 10
RO - Romania 10
TW - Taiwan 10
IQ - Iraq 9
ZA - Sudafrica 8
CO - Colombia 7
EC - Ecuador 7
AT - Austria 6
AZ - Azerbaigian 6
DZ - Algeria 6
EE - Estonia 6
EG - Egitto 6
LT - Lituania 6
AE - Emirati Arabi Uniti 5
KE - Kenya 5
MA - Marocco 5
NG - Nigeria 5
AU - Australia 4
PE - Perù 4
PH - Filippine 4
PS - Palestinian Territory 4
TN - Tunisia 4
UY - Uruguay 4
BG - Bulgaria 3
CH - Svizzera 3
GR - Grecia 3
IL - Israele 3
JO - Giordania 3
NI - Nicaragua 3
NZ - Nuova Zelanda 3
PY - Paraguay 3
UZ - Uzbekistan 3
VE - Venezuela 3
AL - Albania 2
BY - Bielorussia 2
GE - Georgia 2
KH - Cambogia 2
LU - Lussemburgo 2
OM - Oman 2
PA - Panama 2
UG - Uganda 2
BB - Barbados 1
BS - Bahamas 1
CR - Costa Rica 1
CW - ???statistics.table.value.countryCode.CW??? 1
CY - Cipro 1
DK - Danimarca 1
GN - Guinea 1
GP - Guadalupe 1
HN - Honduras 1
IE - Irlanda 1
IS - Islanda 1
JM - Giamaica 1
KG - Kirghizistan 1
KZ - Kazakistan 1
LB - Libano 1
LC - Santa Lucia 1
MM - Myanmar 1
MN - Mongolia 1
MO - Macao, regione amministrativa speciale della Cina 1
NP - Nepal 1
RS - Serbia 1
SR - Suriname 1
SY - Repubblica araba siriana 1
TH - Thailandia 1
TV - Tuvalu 1
Totale 9.849
Città #
Chandler 601
Jacksonville 563
Dallas 350
The Dalles 340
Toronto 290
Singapore 247
Boardman 227
Nanjing 139
Seoul 136
Princeton 126
Istanbul 117
Ashburn 113
Wilmington 110
Ann Arbor 79
Frankfurt am Main 71
Ogden 69
Hong Kong 68
Shenyang 63
Helsinki 62
Falkenstein 53
Los Angeles 52
Beijing 51
Hebei 49
Nanchang 49
Shanghai 48
Dearborn 45
Tianjin 45
Abidjan 43
Jiaxing 43
Changsha 38
Guangzhou 35
Munich 32
Ho Chi Minh City 30
Leawood 30
Bremen 27
Monmouth Junction 27
Zhengzhou 27
San Mateo 26
São Paulo 24
Rome 23
Santa Clara 23
Augusta 22
Redwood City 21
Warsaw 21
Brooklyn 19
Milan 19
Naples 19
Rio de Janeiro 19
Council Bluffs 18
Seattle 18
Taizhou 18
Brussels 17
Redmond 17
Jinan 16
New York 16
San Giorgio Del Sannio 16
Hanoi 15
Boston 14
London 14
Stockholm 14
Chicago 13
Düsseldorf 13
Mexico City 13
Ningbo 13
Ottawa 13
Brasília 12
Mumbai 12
San Francisco 12
Shenzhen 12
Ardabil 11
Tokyo 11
Aversa 10
Columbus 10
Norwalk 10
Charlotte 9
Curitiba 9
Islamabad 9
Jeddah 9
Taipei 9
Assago 8
Boydton 8
Caserta 8
Fiumefreddo di Sicilia 8
Meppel 8
Montreal 8
Wuhan 8
Belo Horizonte 7
Campinas 7
Nantong 7
Piedimonte Matese 7
Amsterdam 6
Ankara 6
Bandung 6
Bexley 6
Bucharest 6
Buffalo 6
Chengdu 6
Hillsboro 6
Indaiatuba 6
Olomouc 6
Totale 5.278
Nome #
A systematic literature review of IoT time series anomaly detection solutions 179
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges 164
A comparison of static, dynamic, and hybrid analysis for malware detection 145
A Classifier of Malicious Android Applications 138
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts 131
An exploratory study on the evolution of Android malware quality 112
A family of experiments to validate metrics for software process models 110
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones 108
A study on misclassification of software vulnerabilities when using deep learning and machine learning algorithms 100
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 98
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges 95
A Three Layered Model To Implement Data Privacy Policies 93
Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) 93
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications 92
How can i improve my app? Classifying user reviews for software maintenance and evolution 92
la misurazione della conoscenza tecnologica nelle organizzazione produttrici di software 90
Detecting Android malware using sequences of system calls 90
Evaluation of BPMN Models Quality - A Family of Experiments 90
Exploring Mobile User Experience Through Code Quality Metrics 90
Identifying Mobile Repackaged Applications through Formal Methods 90
Classic cryptanalysis using hidden Markov models 89
Malware detection employed by visualization and deep neural network 88
Facing Complexity in IT Competence Development: a Multi-Disciplinary Approach To University-Industry Partnerships 87
Ransomware at X-Rays 87
An empirical study of metric-based methods to detect obfuscated code 86
How distribution affects the success of pair programming 86
Identification of Android Malware Families with Model Checking 86
Android apps and user feedback: a dataset for software evolution and quality improvement 86
Demystifying the adoption of behavior-driven development in open source projects 85
Download malware? no, thanks: how formal methods can block update attacks 84
Working in Pairs as a means for Design Knowledge Building: An Empirical Study 83
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection 83
DECA: development emails content analyzer 83
Applying a framework for the improvement of software process maturity 81
Composition-Malware: Building Android Malware at Run Time 81
Pair designing as a practice for enforcing and diffusing design knowledge 80
Pair Designing as Practice for Enforcing and Diffusing Design Knowledge 78
A decision model supporting cooperative work as an experience package 78
ARdoc: app reviews development oriented classifier 78
Repadiography: Towards a visual support for triaging repackaged ApPs 78
An Empirical Investigation on the Trade-off between Smart Contract Readability and Gas Consumption 77
What would users change in my app? summarizing app reviews for recommending software changes 77
Mobile malware detection in the real world 77
An Automatic Framework for Detecting Normalization Flaws in Databases 76
Enhancing online discussion forums with topic-driven content search and assisted posting 76
The Impact of Educational Background on Design Knowledge Sharing During Pair Programming: An Empirical Study 76
A Test Framework for Assessing Effectiveness of the Data Privacy Policy’s Implementation into Relational Databases 76
Confirming the influence on educational background in pair-design knowledge through experiments 76
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware. 75
Enhancing online discussion forums with a topic-driven navigational paradigm: A plugin for the moodle learning management system 75
A set of features to detect web security threats 75
s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables 75
Advanced transcriptase for JavaScript malware 74
Ransomware Steals Your Phone. Formal Methods Rescue It 74
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 74
Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities 74
About the Robustness and Looseness of Yara Rules 74
An HMM and structural entropy based detector for Android malware: An empirical study 73
FMESP: Framework for the Modeling and Evaluation of Software Processes 73
Building measure-based prediction models for UML class diagram maintainability 72
FMESP: Framework for the modelling and evaluation of Software Processes 72
A proposal and empirical validation of metrics to evaluate the maintainability of software process models 72
Lessons Learned about Distributed Pair Programmino: What are the Knowledge Needs ? 72
Tuning anonymity level for assuring high data quality: an empirical study 72
Confirming the influence of Educational Background in Pair-design Knowledge through Experiments 72
Adversarial deep learning for energy management in buildings 72
Profiling gas consumption in solidity smart contracts 72
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks 71
Evaluating Mobile Malware by Extracting User Experience-Based Features 71
Empirical Study on the Productivity of the Pair Programming 71
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics 70
Towards the definition of a maintainability model for web applications 70
Performances of Pair Designing on Software Evolution: a controlled experiment 70
Full Reuse Maintenance Process for Reducing Software Degradation 70
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware 70
Exploiting Natural Language Structures in Software Informal Documentation 70
Session Management Vulnerabilities in Today's Web 70
Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms 70
Integrating Software Competences and Managerial Skills from Humanistic Background: a case study on University-Industry Higher Education Programs 69
Empirical Validation of Pair Programming 69
Development Emails Content Analyzer: Intention Mining in Developer Discussions 69
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter 69
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications 69
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases 69
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms 68
Investigando los beneficios de Pair Designing: un estudio empírico con profesionales 68
From Knowledge Management Concepts toward Software Engineering Practices 67
Evaluating advantages of test driven development: a controlled experiment with professionals 67
Managing Security Knowledge through Case based Reasoning 67
Lessons learned about distributed pair programming: what are the knowledge needs to address? 67
Support vector machines and malware detection 67
Hey Malware, I Can Find You! 67
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media 66
Metamorphic Malware Detection Using Code Metrics 66
Dynamic Software Community of Practice through Three-layered Competence Model 66
Patchworking: Exploring the code changes induced by vulnerability fixing activities 66
Detection of Malicious Web Pages Using System Calls Sequences 65
Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic Analysis 65
An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS Projects 64
Mobile Malware Detection using Op-code Frequency Histograms. 64
Totale 8.117
Categoria #
all - tutte 72.620
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 72.620


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021871 0 0 0 0 0 257 18 132 35 135 281 13
2021/2022682 17 13 288 66 9 23 36 115 49 18 37 11
2022/20231.752 281 101 45 287 135 289 15 138 263 46 121 31
2023/2024712 57 120 120 31 31 11 33 14 145 46 16 88
2024/20252.299 158 81 88 72 275 155 72 299 228 384 288 199
2025/20261.828 376 408 475 233 311 25 0 0 0 0 0 0
Totale 10.023