ARMANDO, ALESSANDRO
 Distribuzione geografica
Continente #
EU - Europa 16.799
AS - Asia 514
SA - Sud America 107
NA - Nord America 38
AF - Africa 10
Totale 17.468
Nazione #
IT - Italia 16.781
SG - Singapore 214
CN - Cina 152
VN - Vietnam 98
BR - Brasile 64
US - Stati Uniti d'America 24
AR - Argentina 23
HK - Hong Kong 20
MX - Messico 13
ID - Indonesia 6
IQ - Iraq 6
CO - Colombia 5
EC - Ecuador 5
FR - Francia 5
BD - Bangladesh 4
CL - Cile 4
RU - Federazione Russa 4
ZA - Sudafrica 4
ES - Italia 3
IN - India 3
NL - Olanda 3
MA - Marocco 2
PH - Filippine 2
PY - Paraguay 2
UY - Uruguay 2
VE - Venezuela 2
AE - Emirati Arabi Uniti 1
CH - Svizzera 1
CY - Cipro 1
EG - Egitto 1
JO - Giordania 1
LB - Libano 1
MW - Malawi 1
PA - Panama 1
PL - Polonia 1
QA - Qatar 1
SA - Arabia Saudita 1
SC - Seychelles 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
TR - Turchia 1
TW - Taiwan 1
UA - Ucraina 1
Totale 17.468
Città #
Genova 10.763
Genoa 3.647
Rapallo 1.308
Vado Ligure 1.017
Singapore 102
Beijing 44
Ho Chi Minh City 41
Bordighera 32
Hong Kong 20
Hanoi 16
Ashburn 15
Mexico City 13
Haiphong 6
Tianjin 6
Biên Hòa 5
Compiègne 5
Da Nang 5
Rio de Janeiro 5
Bogotá 3
Guayaquil 3
Johannesburg 3
Los Angeles 3
Milan 3
Ninh Bình 3
Quảng Ngãi 3
São Paulo 3
Amsterdam 2
As Samawah 2
Baghdad 2
Buenos Aires 2
Campinas 2
Can Tho 2
Hải Dương 2
Lanciano 2
Montevideo 2
Rome 2
San Pietro a Maida 2
Uberaba 2
Aimogasta 1
Alvorada 1
Amman 1
Ancol 1
Andradina 1
Antofagasta 1
Araranguá 1
Asunción 1
Barbacena 1
Belo Campo 1
Belo Horizonte 1
Benavídez 1
Berrotarán 1
Bismarck 1
Blantyre 1
Boituva 1
Brasília 1
Bình Dương 1
Bắc Ninh 1
Bến Cầu 1
Cabo Frio 1
Cachoeiro de Itapemirim 1
Cairo 1
Casablanca 1
Chennai 1
Cherepovets 1
Chernivtsi 1
Cirebon 1
Clark 1
Concordia 1
Conselheiro Lafaiete 1
Cortês 1
Cotia 1
Cuenca 1
Dagupan 1
Dalian 1
Damascus 1
Doha 1
Dubai 1
Durban 1
Fortaleza 1
Foshan 1
Governador Valadares 1
Granada 1
Gravatá do Ibiapina 1
Guarujá 1
Ha Long 1
Hefei 1
Hortolândia 1
Huế 1
Indore 1
Isidro Casanova 1
Itaboraí 1
Ituiutaba 1
Jaguariúna 1
Jakarta 1
Jaraguá do Sul 1
Jussara 1
Karbala 1
La Plata 1
Lagoa Santa 1
Lagoa da Prata 1
Totale 17.160
Nome #
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols 202
Automatic security verification of mobile app configurations 195
Formal modeling and automatic enforcement of Bring Your Own Device policies 193
An Empirical Evaluation of the Android Security Framework 181
Attribute Based Access Control for APIs in Spring Security 176
Android vs. SEAndroid: An empirical assessment 174
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-Based Approach 168
Automated Analysis of Infinite State Workflows with Access Control Policies 167
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints 166
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications 164
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 162
Attacking (and Defending) the Maritime Radar System 159
MRG: Building Planners for Real World Complex Applications 159
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs 159
The Control Layer in Open Mechanized Reasoning Systems: Annotations and Tactics 158
Android Permissions Unleashed 157
Developing a NATO BYOD security policy 156
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 155
An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations 155
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 154
LTL Model Checking for Security Protocols 154
SAT-based Model Checking for Security Protocols Analysis 151
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning 150
Formal Modeling and Reasoning about the Android Security Framework 150
Trustworthy Opportunistic Access to the Internet of Services 150
Abstraction refinement of Linear Programs with Arrays 149
Risk-based privacy-aware access control for threat detection systems 149
Counterexample-guided abstraction refinement for linear programs with arrays 148
SAT-Based Decision Procedures for Automated Reasoning: a Unifying Perspective 147
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 145
Enabling BYOD through secure meta-market 142
NALIG: A CAD system for interior design with high level interaction capabilities 141
Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm 140
Embedding complex decision procedures inside an interactive theorem prover 140
Breaking and fixing the Android Launching Flow 140
Mobile app security assessment with the maveric dynamic analysis module 140
LTL Model Checking for Security Protocols 137
From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? 137
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols 137
Trusted host-based card emulation 137
Abstraction-driven SAT-based Analysis of Security Protocols 136
TSAT++: an Open Platform for Satisfiability Modulo Theories 136
Model checking authorization requirements in business processes 135
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 135
ASASP: Automated Symbolic Analysis of Security Policies 135
SATMC: a SAT-based Model Checker for Security Protocols 134
From Propositional Deciders to First Order Deciders: a Structured Approach to the Decision Problem 134
Structured proof procedures 133
Bring your own device, securely 133
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis 132
Mobile App Security Analysis with the MAVeriC Static Analysis Module 132
Computer aided modelling and simulation of complex mechanical systems 132
Automated Security Analysis of IoT Software Updates 132
Building SMT-based Software Model Checkers: an Experience Report 130
A knowledge Based System for Automatic 3D Scene Generation 130
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 130
The Phase Transition of the Linear Inequalities Problem 129
Cooperative Access Control for the Grid 129
The SAT-based Approach to Separation Logic 129
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries 129
Incorporating Decision Procedures in Implicit Induction 129
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 128
Security considerations related to the use of mobile devices in the operation of critical infrastructures 127
SATMC: a SAT-based Model Checker for Security-critical Systems 127
Automatic Security Analysis of SAML-Based Single Sign-On Protocols 127
SMT-based enforcement and analysis of NATO content-based protection and release policies 127
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 126
An Action-based Approach to the Formal Specification and Automated Analysis of Business Processes under Authorization Constraints 126
A Reconstruction and Extension of Maple's Assume Facility via Constraint Contextual Rewriting. 125
Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm 124
Selective Release of Smart Metering Data in Multi-domain Smart Grids 124
Uniform Derivation of Decision Procedures by Superposition 123
Bounded Model Checking of Software using SMT Solvers instead of SAT Solvers 122
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures 122
Model Checking of Security-sensitive Business Processes 121
Visual Representation of Natural Language Scene Descriptions 121
The Rewriting Approach to Satisfiability Procedures 120
Towards provably correct system synthesis and extension 120
Model Checking Linear Programs with Arrays 120
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries 120
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 119
SAT-Based Procedures for Temporal Reasoning 119
Content- based information protection and release in NATO operations 119
The AVISS Security Protocol Analysis Tool 118
Building and executing proof strategies in a formal metatheory 118
Preface to the Special Issue of the Journal of Automated Reasoning on "Automated Reasoning for Security Protocol Analysis" 117
Navigation by combining reactivity and planning 117
Special Issue of the Journal of Symbolic Computation onCalculemus-99: Integrating Computation and Deduction - Foreword of the Guest Editors 115
System Description: RDL Rewrite and Decision procedure Laboratory 115
Flexible planning by integrating multilevel reasoning 114
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 114
Software Model Checking using Linear Constraints 114
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations 114
Formal Analysis of a Privacy-Preserving Billing Protocol 113
Automatic Compilation of Protocol Insecurity Problems into Logic Programming 113
Constraint Contextual Rewriting 112
Termination of Constraint Contextual Rewriting 111
Proving formulas through reduction to decidable classes 110
Securing the ``Bring Your Own Device'' Paradigm 110
Constraint solving in Logic Programming and in Automated Deduction: A comparison 109
Totale 13.659
Categoria #
all - tutte 56.362
article - articoli 20.613
book - libri 0
conference - conferenze 29.283
curatela - curatele 991
other - altro 0
patent - brevetti 115
selected - selezionate 0
volume - volumi 5.360
Totale 112.724


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021687 0 0 0 0 0 104 67 98 97 140 89 92
2021/20221.760 34 169 202 191 62 91 140 414 56 118 113 170
2022/20231.590 158 62 19 122 274 325 15 130 295 13 134 43
2023/2024812 48 133 30 107 60 145 43 54 36 19 34 103
2024/20252.422 60 215 68 133 363 267 163 438 62 95 217 341
2025/20261.907 583 111 292 337 502 82 0 0 0 0 0 0
Totale 17.571