VISAGGIO, CORRADO AARON
 Distribuzione geografica
Continente #
NA - Nord America 5.413
AS - Asia 3.150
EU - Europa 2.414
SA - Sud America 573
AF - Africa 128
Continente sconosciuto - Info sul continente non disponibili 18
OC - Oceania 8
Totale 11.704
Nazione #
US - Stati Uniti d'America 5.021
CN - Cina 1.198
SG - Singapore 1.044
UA - Ucraina 810
IT - Italia 483
DE - Germania 472
BR - Brasile 444
CA - Canada 335
SE - Svezia 163
KR - Corea 144
TR - Turchia 138
IN - India 130
FR - Francia 119
VN - Vietnam 103
HK - Hong Kong 93
FI - Finlandia 70
GB - Regno Unito 65
CI - Costa d'Avorio 45
AR - Argentina 44
PL - Polonia 40
RU - Federazione Russa 40
BD - Bangladesh 37
MX - Messico 36
PK - Pakistan 36
NL - Olanda 31
IR - Iran 30
ES - Italia 27
SA - Arabia Saudita 27
CO - Colombia 22
JP - Giappone 21
EC - Ecuador 20
IQ - Iraq 20
ID - Indonesia 19
MY - Malesia 19
BE - Belgio 18
EU - Europa 17
VE - Venezuela 17
MA - Marocco 16
ZA - Sudafrica 15
PH - Filippine 14
PT - Portogallo 13
RO - Romania 11
CZ - Repubblica Ceca 10
TW - Taiwan 10
UY - Uruguay 10
EG - Egitto 9
TN - Tunisia 9
KE - Kenya 8
AE - Emirati Arabi Uniti 7
JO - Giordania 7
LT - Lituania 7
UZ - Uzbekistan 7
AT - Austria 6
AZ - Azerbaigian 6
DZ - Algeria 6
EE - Estonia 6
AL - Albania 5
CL - Cile 5
NG - Nigeria 5
NP - Nepal 5
AU - Australia 4
ET - Etiopia 4
GE - Georgia 4
GR - Grecia 4
NI - Nicaragua 4
PA - Panama 4
PE - Perù 4
PS - Palestinian Territory 4
BG - Bulgaria 3
BO - Bolivia 3
CH - Svizzera 3
DO - Repubblica Dominicana 3
IL - Israele 3
JM - Giamaica 3
KZ - Kazakistan 3
LB - Libano 3
NZ - Nuova Zelanda 3
PY - Paraguay 3
SY - Repubblica araba siriana 3
TH - Thailandia 3
UG - Uganda 3
BY - Bielorussia 2
HN - Honduras 2
KG - Kirghizistan 2
KH - Cambogia 2
LU - Lussemburgo 2
MM - Myanmar 2
OM - Oman 2
SN - Senegal 2
BB - Barbados 1
BH - Bahrain 1
BS - Bahamas 1
CR - Costa Rica 1
CW - ???statistics.table.value.countryCode.CW??? 1
CY - Cipro 1
DK - Danimarca 1
GN - Guinea 1
GP - Guadalupe 1
IE - Irlanda 1
IS - Islanda 1
Totale 11.693
Città #
Chandler 601
Jacksonville 563
San Jose 498
The Dalles 405
Singapore 370
Ashburn 364
Dallas 351
Toronto 291
Boardman 232
Nanjing 139
Seoul 136
Princeton 126
Istanbul 118
Wilmington 110
Beijing 82
Ann Arbor 79
Hong Kong 79
Frankfurt am Main 75
Ogden 69
Helsinki 64
Shenyang 63
Los Angeles 57
Shanghai 54
Falkenstein 53
Hebei 49
Nanchang 49
Tianjin 49
Abidjan 45
Dearborn 45
Jiaxing 45
Guangzhou 41
Ho Chi Minh City 40
Changsha 39
Munich 32
Santa Clara 31
São Paulo 31
Warsaw 31
Leawood 30
Zhengzhou 28
Bremen 27
Monmouth Junction 27
Rome 26
San Mateo 26
Council Bluffs 24
Augusta 22
Orem 22
Redwood City 21
Hanoi 20
Mexico City 20
Milan 20
New York 20
Brooklyn 19
Hillsboro 19
Naples 19
Rio de Janeiro 19
Jinan 18
Seattle 18
Taizhou 18
Brussels 17
Mumbai 17
Redmond 17
San Giorgio Del Sannio 16
Shenzhen 16
Stockholm 16
London 15
Boston 14
Brasília 14
Chicago 14
Ottawa 14
Chennai 13
Düsseldorf 13
Montreal 13
Ningbo 13
San Francisco 13
Tokyo 12
Ardabil 11
Jeddah 11
Aversa 10
Columbus 10
Islamabad 10
Norwalk 10
Quito 10
Campinas 9
Charlotte 9
Curitiba 9
Taipei 9
Assago 8
Boydton 8
Caracas 8
Caserta 8
Fiumefreddo di Sicilia 8
Medellín 8
Meppel 8
Montevideo 8
Nairobi 8
Wuhan 8
Amsterdam 7
Bandung 7
Bari 7
Belo Horizonte 7
Totale 6.432
Nome #
A systematic literature review of IoT time series anomaly detection solutions 189
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges 182
A comparison of static, dynamic, and hybrid analysis for malware detection 158
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts 158
A Classifier of Malicious Android Applications 154
An exploratory study on the evolution of Android malware quality 131
A study on misclassification of software vulnerabilities when using deep learning and machine learning algorithms 128
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones 123
A family of experiments to validate metrics for software process models 122
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 113
Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) 110
A Three Layered Model To Implement Data Privacy Policies 108
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications 108
An empirical study of metric-based methods to detect obfuscated code 106
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges 106
Facing Complexity in IT Competence Development: a Multi-Disciplinary Approach To University-Industry Partnerships 105
la misurazione della conoscenza tecnologica nelle organizzazione produttrici di software 103
Detecting Android malware using sequences of system calls 103
Evaluation of BPMN Models Quality - A Family of Experiments 103
Identifying Mobile Repackaged Applications through Formal Methods 103
Download malware? no, thanks: how formal methods can block update attacks 103
How can i improve my app? Classifying user reviews for software maintenance and evolution 102
Demystifying the adoption of behavior-driven development in open source projects 102
Malware detection employed by visualization and deep neural network 101
How distribution affects the success of pair programming 100
Android apps and user feedback: a dataset for software evolution and quality improvement 100
Identification of Android Malware Families with Model Checking 99
Exploring Mobile User Experience Through Code Quality Metrics 99
Pair designing as a practice for enforcing and diffusing design knowledge 98
About the Robustness and Looseness of Yara Rules 97
Composition-Malware: Building Android Malware at Run Time 96
Classic cryptanalysis using hidden Markov models 96
A decision model supporting cooperative work as an experience package 95
A Test Framework for Assessing Effectiveness of the Data Privacy Policy’s Implementation into Relational Databases 95
Working in Pairs as a means for Design Knowledge Building: An Empirical Study 94
Ransomware at X-Rays 94
Applying a framework for the improvement of software process maturity 93
The Impact of Educational Background on Design Knowledge Sharing During Pair Programming: An Empirical Study 92
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection 92
Profiling gas consumption in solidity smart contracts 92
Pair Designing as Practice for Enforcing and Diffusing Design Knowledge 91
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics 91
Evaluating Mobile Malware by Extracting User Experience-Based Features 91
DECA: development emails content analyzer 91
An Automatic Framework for Detecting Normalization Flaws in Databases 90
FMESP: Framework for the modelling and evaluation of Software Processes 90
Full Reuse Maintenance Process for Reducing Software Degradation 90
An Empirical Investigation on the Trade-off between Smart Contract Readability and Gas Consumption 89
Towards the definition of a maintainability model for web applications 89
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware. 89
Enhancing online discussion forums with topic-driven content search and assisted posting 89
Confirming the influence on educational background in pair-design knowledge through experiments 89
Tuning anonymity level for assuring high data quality: an empirical study 88
ARdoc: app reviews development oriented classifier 88
Repadiography: Towards a visual support for triaging repackaged ApPs 88
Automatic Classification of Vulnerabilities using Deep Learning and Machine Learning Algorithms 88
A proposal and empirical validation of metrics to evaluate the maintainability of software process models 87
Performances of Pair Designing on Software Evolution: a controlled experiment 87
Lessons learned about distributed pair programming: what are the knowledge needs to address? 87
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter 87
What would users change in my app? summarizing app reviews for recommending software changes 87
Patchworking: Exploring the code changes induced by vulnerability fixing activities 87
Empirical Study on the Productivity of the Pair Programming 86
Enhancing online discussion forums with a topic-driven navigational paradigm: A plugin for the moodle learning management system 86
s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables 86
An HMM and structural entropy based detector for Android malware: An empirical study 86
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware 86
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 86
Talos: no more ransomware victims with formal methods 86
Building measure-based prediction models for UML class diagram maintainability 85
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks 85
Confirming the influence of Educational Background in Pair-design Knowledge through Experiments 85
Ransomware Steals Your Phone. Formal Methods Rescue It 85
Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities 85
Mobile malware detection in the real world 85
Lessons Learned about Distributed Pair Programmino: What are the Knowledge Needs ? 84
Exploiting Natural Language Structures in Software Informal Documentation 84
Hey Malware, I Can Find You! 84
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms 83
Beyond Words: Stylometric Analysis for Detecting AI Manipulation on Social Media 82
Adversarial deep learning for energy management in buildings 82
Session Management Vulnerabilities in Today's Web 82
FMESP: Framework for the Modeling and Evaluation of Software Processes 82
Integrating Software Competences and Managerial Skills from Humanistic Background: a case study on University-Industry Higher Education Programs 81
Advanced transcriptase for JavaScript malware 81
Dynamic Software Community of Practice through Three-layered Competence Model 80
From Knowledge Management Concepts toward Software Engineering Practices 80
Evaluating advantages of test driven development: a controlled experiment with professionals 80
Investigando los beneficios de Pair Designing: un estudio empírico con profesionales 80
Development Emails Content Analyzer: Intention Mining in Developer Discussions 80
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? 79
A set of features to detect web security threats 79
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases 79
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications 77
Mobile Malware Detection using Op-code Frequency Histograms. 76
Managing Security Knowledge through Case based Reasoning 76
Empirical Validation of Pair Programming 76
Detection of Malicious Web Pages Using System Calls Sequences 76
Metamorphic Malware Detection Using Code Metrics 75
WECAP: A Web Environment for Project Planning 75
Totale 9.511
Categoria #
all - tutte 76.891
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 76.891


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021429 0 0 0 0 0 0 0 0 0 135 281 13
2021/2022682 17 13 288 66 9 23 36 115 49 18 37 11
2022/20231.752 281 101 45 287 135 289 15 138 263 46 121 31
2023/2024712 57 120 120 31 31 11 33 14 145 46 16 88
2024/20252.299 158 81 88 72 275 155 72 299 228 384 288 199
2025/20263.688 376 408 475 233 311 249 730 266 331 309 0 0
Totale 11.883