VISAGGIO, CORRADO AARON
 Distribuzione geografica
Continente #
NA - Nord America 3.304
EU - Europa 1.852
AS - Asia 1.305
AF - Africa 58
SA - Sud America 31
Continente sconosciuto - Info sul continente non disponibili 17
OC - Oceania 5
Totale 6.572
Nazione #
US - Stati Uniti d'America 2.997
CN - Cina 825
UA - Ucraina 801
IT - Italia 358
CA - Canada 305
DE - Germania 305
SE - Svezia 149
SG - Singapore 144
TR - Turchia 116
IN - India 68
FI - Finlandia 55
CI - Costa d'Avorio 41
FR - Francia 34
IR - Iran 29
BR - Brasile 26
HK - Hong Kong 25
RU - Federazione Russa 22
NL - Olanda 21
GB - Regno Unito 20
BE - Belgio 18
EU - Europa 17
PK - Pakistan 14
MY - Malesia 12
PT - Portogallo 12
JP - Giappone 11
RO - Romania 10
VN - Vietnam 10
TW - Taiwan 9
ES - Italia 8
SA - Arabia Saudita 8
CZ - Repubblica Ceca 7
ID - Indonesia 7
AT - Austria 6
KR - Corea 6
BD - Bangladesh 5
DZ - Algeria 5
LT - Lituania 5
AE - Emirati Arabi Uniti 4
AU - Australia 4
EG - Egitto 4
NG - Nigeria 4
PL - Polonia 4
BG - Bulgaria 3
CH - Svizzera 3
AL - Albania 2
EC - Ecuador 2
GR - Grecia 2
KH - Cambogia 2
LU - Lussemburgo 2
MX - Messico 2
PE - Perù 2
UG - Uganda 2
AZ - Azerbaigian 1
BY - Bielorussia 1
CO - Colombia 1
CY - Cipro 1
DK - Danimarca 1
IE - Irlanda 1
IL - Israele 1
IS - Islanda 1
KE - Kenya 1
KG - Kirghizistan 1
KZ - Kazakistan 1
MA - Marocco 1
MM - Myanmar 1
MO - Macao, regione amministrativa speciale della Cina 1
NZ - Nuova Zelanda 1
PH - Filippine 1
PS - Palestinian Territory 1
RS - Serbia 1
TH - Thailandia 1
Totale 6.572
Città #
Chandler 601
Jacksonville 562
Toronto 288
Boardman 227
Nanjing 139
Princeton 126
Istanbul 114
Wilmington 110
Singapore 104
Ann Arbor 79
Ogden 69
Shenyang 63
Helsinki 54
Hebei 49
Nanchang 49
Shanghai 47
Dearborn 45
Jiaxing 43
Abidjan 41
Tianjin 40
Changsha 37
Guangzhou 35
Los Angeles 32
Leawood 30
Bremen 27
Monmouth Junction 27
San Mateo 26
Zhengzhou 26
Beijing 21
Redwood City 21
Ashburn 20
Augusta 20
Brussels 17
Naples 17
Redmond 17
Taizhou 17
Jinan 16
San Giorgio Del Sannio 16
Frankfurt am Main 14
Rome 14
Ningbo 13
Hong Kong 12
Ottawa 12
Ardabil 11
Shenzhen 11
Aversa 10
Norwalk 10
Dallas 9
Islamabad 9
Munich 9
Seattle 9
Taipei 9
Fiumefreddo di Sicilia 8
Meppel 8
Mumbai 8
Boydton 7
Milan 7
Piedimonte Matese 7
Santa Clara 7
Bucharest 6
Chengdu 6
Jeddah 6
Wuhan 6
Acerra 5
Amsterdam 5
Bari 5
Castellammare di Stabia 5
Fairfax 5
London 5
Maddaloni 5
Musashino 5
Nantong 5
Portland 5
Rui'an 5
Strasbourg 5
Tallahassee 5
Caserta 4
Central 4
Dresden 4
Ho Chi Minh City 4
Kuala Lumpur 4
Padova 4
Sabz 4
Tokyo 4
Trani 4
Vienna 4
Vitoria de Santo Antao 4
Wuxi 4
Xuzhou 4
Yiwu 4
Alife 3
Anqing 3
Avellino 3
Bangalore 3
Bologna 3
Brno 3
Casalnuovo di Napoli 3
Catania 3
Central District 3
Cremona 3
Totale 3.651
Nome #
A systematic literature review of blockchain and smart contract development: Techniques, tools, and open challenges 123
A comparison of static, dynamic, and hybrid analysis for malware detection 120
A systematic literature review of IoT time series anomaly detection solutions 100
A Classifier of Malicious Android Applications 86
A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts 81
An exploratory study on the evolution of Android malware quality 77
Development Emails Content Analyzer: Intention Mining in Developer Discussions (T) 72
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges 71
Facing Complexity in IT Competence Development: a Multi-Disciplinary Approach To University-Industry Partnerships 70
Evaluation of BPMN Models Quality - A Family of Experiments 70
How can i improve my app? Classifying user reviews for software maintenance and evolution 68
Ransomware at X-Rays 68
Classic cryptanalysis using hidden Markov models 67
A Case Study of Automating User Experience-Oriented Performance Testing on Smartphones 65
Android apps and user feedback: a dataset for software evolution and quality improvement 65
A family of experiments to validate metrics for software process models 64
Detecting Android malware using sequences of system calls 63
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications 63
Enhancing online discussion forums with topic-driven content search and assisted posting 62
Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection 62
A Three Layered Model To Implement Data Privacy Policies 61
la misurazione della conoscenza tecnologica nelle organizzazione produttrici di software 60
Exploring Mobile User Experience Through Code Quality Metrics 60
Download malware? no, thanks: how formal methods can block update attacks 60
Working in Pairs as a means for Design Knowledge Building: An Empirical Study 59
Tuning anonymity level for assuring high data quality: an empirical study 59
A study on misclassification of software vulnerabilities when using deep learning and machine learning algorithms 59
Pair designing as a practice for enforcing and diffusing design knowledge 58
Performances of Pair Designing on Software Evolution: a controlled experiment 58
Identification of Android Malware Families with Model Checking 58
What would users change in my app? summarizing app reviews for recommending software changes 58
Metamorphic Malware Detection Using Code Metrics 57
Applying a framework for the improvement of software process maturity 57
Confirming the influence of Educational Background in Pair-design Knowledge through Experiments 57
The Impact of Educational Background on Design Knowledge Sharing During Pair Programming: An Empirical Study 57
s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables 57
Composition-Malware: Building Android Malware at Run Time 56
Confirming the influence on educational background in pair-design knowledge through experiments 56
Mobile malware detection in the real world 56
FMESP: Framework for the Modeling and Evaluation of Software Processes 56
A proposal and empirical validation of metrics to evaluate the maintainability of software process models 55
Demystifying the adoption of behavior-driven development in open source projects 55
DECA: development emails content analyzer 55
Building measure-based prediction models for UML class diagram maintainability 54
Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware. 54
Empirical Study on the Productivity of the Pair Programming 54
I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware 54
Adversarial deep learning for energy management in buildings 54
Are fit tables really talking?: a series of experiments to understand whether fit tables are useful during evolution tasks 53
From Knowledge Management Concepts toward Software Engineering Practices 53
Evaluating advantages of test driven development: a controlled experiment with professionals 53
Lessons Learned about Distributed Pair Programmino: What are the Knowledge Needs ? 53
Empirical Validation of Pair Programming 53
Enhancing online discussion forums with a topic-driven navigational paradigm: A plugin for the moodle learning management system 53
Malware detection employed by visualization and deep neural network 53
Pair Designing as Practice for Enforcing and Diffusing Design Knowledge 52
How distribution affects the success of pair programming 52
An Automatic Framework for Detecting Normalization Flaws in Databases 52
Evaluating Mobile Malware by Extracting User Experience-Based Features 52
Integrating Software Competences and Managerial Skills from Humanistic Background: a case study on University-Industry Higher Education Programs 52
Managing Security Knowledge through Case based Reasoning 52
Full Reuse Maintenance Process for Reducing Software Degradation 52
Session Management Vulnerabilities in Today's Web 52
Towards the definition of a maintainability model for web applications 51
A decision model supporting cooperative work as an experience package 51
Lessons learned about distributed pair programming: what are the knowledge needs to address? 51
Dynamic Software Community of Practice through Three-layered Competence Model 50
Investigando los beneficios de Pair Designing: un estudio empírico con profesionales 50
A Test Framework for Assessing Effectiveness of the Data Privacy Policy’s Implementation into Relational Databases 50
Advanced transcriptase for JavaScript malware 50
A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases 50
FMESP: Framework for the modelling and evaluation of Software Processes 49
FMESP: A Framework for the Modeling and Evalution of Software 49
A set of features to detect web security threats 49
Clustering for malware classification 49
An HMM and structural entropy based detector for Android malware: An empirical study 49
ARdoc: app reviews development oriented classifier 49
It's a Matter of Style: Detecting Social Bots through Writing Style Consistency 49
Mobile Malware Detection using Op-code Frequency Histograms. 48
Static analysis for the detection of metamorphic computer viruses using repeated-instructions counting heuristics 47
WECAP: A Web Environment for Project Planning 47
Identifying Mobile Repackaged Applications through Formal Methods 47
An empirical study of metric-based methods to detect obfuscated code 46
A System to Prevent Multi-users and Multi-sessions Attack to Breach Privacy Policies in a Trust-End Filter 46
Profiling gas consumption in solidity smart contracts 46
Development Emails Content Analyzer: Intention Mining in Developer Discussions 45
Support vector machines and malware detection 45
Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile Applications 45
Patchworking: Exploring the code changes induced by vulnerability fixing activities 45
About the Robustness and Looseness of Yara Rules 45
An Exploratory Study on Self-Fixed Software Vulnerabilities in OSS Projects 44
Ransomware Steals Your Phone. Formal Methods Rescue It 44
Summarizing vulnerabilities’ descriptions to support experts during vulnerability assessment activities 44
Exploiting Natural Language Structures in Software Informal Documentation 44
An Empirical Investigation on the Trade-off between Smart Contract Readability and Gas Consumption 43
Does Enforcing Anonymity Mean Decreasing Data Usefulness? 43
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 43
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis 43
L’Integrazione delle Competenze nelle Relazioni Università-Imprese: un Caso di Studio sulla Gestione dei Knowledge Workers nelle ICT 42
Silent and Continuous Authentication in Mobile Environment 42
Totale 5.628
Categoria #
all - tutte 46.338
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 46.338


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020347 0 0 0 0 0 0 26 153 14 121 18 15
2020/20211.268 139 113 12 123 10 257 18 132 35 135 281 13
2021/2022682 17 13 288 66 9 23 36 115 49 18 37 11
2022/20231.752 281 101 45 287 135 289 15 138 263 46 121 31
2023/2024712 57 120 120 31 31 11 33 14 145 46 16 88
2024/2025838 158 81 88 72 275 155 9 0 0 0 0 0
Totale 6.734