ARMANDO, ALESSANDRO
 Distribuzione geografica
Continente #
EU - Europa 17.100
AS - Asia 1.414
NA - Nord America 484
SA - Sud America 147
AF - Africa 26
Totale 19.171
Nazione #
IT - Italia 16.834
SG - Singapore 643
US - Stati Uniti d'America 454
CN - Cina 393
VN - Vietnam 211
FR - Francia 137
BR - Brasile 88
HK - Hong Kong 54
DE - Germania 35
JP - Giappone 34
AR - Argentina 27
GB - Regno Unito 22
CH - Svizzera 20
MX - Messico 14
NL - Olanda 13
IN - India 12
CA - Canada 9
IQ - Iraq 9
CO - Colombia 8
BD - Bangladesh 7
CL - Cile 7
EC - Ecuador 7
ID - Indonesia 7
IE - Irlanda 7
PH - Filippine 7
TR - Turchia 7
ES - Italia 6
RU - Federazione Russa 6
ZA - Sudafrica 6
EG - Egitto 5
JO - Giordania 4
KR - Corea 4
MA - Marocco 4
PL - Polonia 4
PY - Paraguay 4
TW - Taiwan 4
FI - Finlandia 3
PK - Pakistan 3
SA - Arabia Saudita 3
VE - Venezuela 3
AE - Emirati Arabi Uniti 2
KZ - Kazakistan 2
LT - Lituania 2
NO - Norvegia 2
PA - Panama 2
TT - Trinidad e Tobago 2
UA - Ucraina 2
UY - Uruguay 2
AZ - Azerbaigian 1
BB - Barbados 1
BG - Bulgaria 1
BO - Bolivia 1
BW - Botswana 1
CI - Costa d'Avorio 1
CR - Costa Rica 1
CY - Cipro 1
DZ - Algeria 1
GN - Guinea 1
HR - Croazia 1
KE - Kenya 1
LB - Libano 1
MD - Moldavia 1
MR - Mauritania 1
MT - Malta 1
MW - Malawi 1
MY - Malesia 1
NG - Nigeria 1
NI - Nicaragua 1
OM - Oman 1
QA - Qatar 1
RE - Reunion 1
RO - Romania 1
SC - Seychelles 1
SE - Svezia 1
SK - Slovacchia (Repubblica Slovacca) 1
SY - Repubblica araba siriana 1
TN - Tunisia 1
UZ - Uzbekistan 1
Totale 19.171
Città #
Genova 10.763
Genoa 3.649
Rapallo 1.308
Vado Ligure 1.017
Singapore 302
San Jose 202
Lauterbourg 124
Ashburn 66
Ho Chi Minh City 65
Hong Kong 51
Beijing 50
Hanoi 37
Bordighera 32
Tokyo 30
Frankfurt am Main 27
New York 25
Santa Clara 21
Zurich 20
Mexico City 13
Amsterdam 12
Da Nang 12
Haiphong 12
Orem 12
Los Angeles 7
Milan 7
Biên Hòa 6
Dublin 6
Montreal 6
Rome 6
São Paulo 6
Tianjin 6
Bologna 5
Cardiff 5
City of London 5
Compiègne 5
Rio de Janeiro 5
Amman 4
Bogotá 4
Cairo 4
Can Tho 4
Chicago 4
Johannesburg 4
Manchester 4
Nuremberg 4
Warsaw 4
Baghdad 3
Buenos Aires 3
Des Moines 3
Fortaleza 3
Guangzhou 3
Guayaquil 3
Helsinki 3
Hưng Yên 3
Hải Dương 3
Leipzig 3
London 3
Luzzi 3
New Delhi 3
Ninh Bình 3
Quảng Ngãi 3
Turin 3
As Samawah 2
Asunción 2
Bergen 2
Brasília 2
Buffalo 2
Bến Tre 2
Cagliari 2
Campinas 2
Changsha 2
Chennai 2
Dallas 2
Denver 2
Karachi 2
Lanciano 2
Manaus 2
Montevideo 2
Moscow 2
New Taipei City 2
Osaka 2
Panama City 2
Paris 2
Pasadena 2
Pergine Valsugana 2
Poplar 2
Quito 2
Riyadh 2
San Pietro a Maida 2
The Dalles 2
Uberaba 2
Vinh 2
Điện Bàn 2
Abidjan 1
Acalanes Ridge 1
Acerra 1
Agrolândia 1
Aimogasta 1
Alvorada 1
Amargosa 1
Amarillo 1
Totale 18.079
Nome #
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols 213
Automatic security verification of mobile app configurations 211
Formal modeling and automatic enforcement of Bring Your Own Device policies 208
An Empirical Evaluation of the Android Security Framework 192
Android vs. SEAndroid: An empirical assessment 184
Android Permissions Unleashed 183
Attacking (and Defending) the Maritime Radar System 181
Attribute Based Access Control for APIs in Spring Security 181
Automated Analysis of Infinite State Workflows with Access Control Policies 180
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints 179
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-Based Approach 178
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 177
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications 177
MRG: Building Planners for Real World Complex Applications 175
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs 172
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 169
Developing a NATO BYOD security policy 169
An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations 168
The Control Layer in Open Mechanized Reasoning Systems: Annotations and Tactics 167
LTL Model Checking for Security Protocols 166
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 164
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning 164
Formal Modeling and Reasoning about the Android Security Framework 164
Risk-based privacy-aware access control for threat detection systems 163
SAT-based Model Checking for Security Protocols Analysis 162
Abstraction refinement of Linear Programs with Arrays 160
Trustworthy Opportunistic Access to the Internet of Services 160
Mobile App Security Analysis with the MAVeriC Static Analysis Module 159
Counterexample-guided abstraction refinement for linear programs with arrays 159
Enabling BYOD through secure meta-market 157
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 157
Trusted host-based card emulation 156
SAT-Based Decision Procedures for Automated Reasoning: a Unifying Perspective 155
Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm 153
NALIG: A CAD system for interior design with high level interaction capabilities 152
Breaking and fixing the Android Launching Flow 152
Mobile app security assessment with the maveric dynamic analysis module 151
Embedding complex decision procedures inside an interactive theorem prover 150
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols 150
Abstraction-driven SAT-based Analysis of Security Protocols 148
From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? 147
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 147
LTL Model Checking for Security Protocols 146
Automated Security Analysis of IoT Software Updates 146
From Propositional Deciders to First Order Deciders: a Structured Approach to the Decision Problem 145
A knowledge Based System for Automatic 3D Scene Generation 144
Computer aided modelling and simulation of complex mechanical systems 144
SATMC: a SAT-based Model Checker for Security Protocols 143
Building SMT-based Software Model Checkers: an Experience Report 143
Automatic Synthesis of Recursive Programs: The Proof-Planning Paradigm 143
Bring your own device, securely 143
Automatic Security Analysis of SAML-Based Single Sign-On Protocols 143
TSAT++: an Open Platform for Satisfiability Modulo Theories 143
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis 142
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 142
Capture the Flag competitions for Higher Education 142
Model checking authorization requirements in business processes 141
Structured proof procedures 139
The SAT-based Approach to Separation Logic 139
ASASP: Automated Symbolic Analysis of Security Policies 139
The Phase Transition of the Linear Inequalities Problem 138
Security considerations related to the use of mobile devices in the operation of critical infrastructures 138
SATMC: a SAT-based Model Checker for Security-critical Systems 138
An Action-based Approach to the Formal Specification and Automated Analysis of Business Processes under Authorization Constraints 138
Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries 138
Cooperative Access Control for the Grid 137
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 137
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 136
SMT-based enforcement and analysis of NATO content-based protection and release policies 136
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries 136
Bounded Model Checking of Software using SMT Solvers instead of SAT Solvers 135
Selective Release of Smart Metering Data in Multi-domain Smart Grids 135
Incorporating Decision Procedures in Implicit Induction 135
Uniform Derivation of Decision Procedures by Superposition 134
A Reconstruction and Extension of Maple's Assume Facility via Constraint Contextual Rewriting. 133
Navigation by combining reactivity and planning 132
The Rewriting Approach to Satisfiability Procedures 131
The AVISS Security Protocol Analysis Tool 131
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 131
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures 131
Towards provably correct system synthesis and extension 131
Visual Representation of Natural Language Scene Descriptions 131
Model Checking Linear Programs with Arrays 131
Model Checking of Security-sensitive Business Processes 130
Building and executing proof strategies in a formal metatheory 130
Preface to the Special Issue of the Journal of Automated Reasoning on "Automated Reasoning for Security Protocol Analysis" 129
SAT-Based Procedures for Temporal Reasoning 128
Content- based information protection and release in NATO operations 128
Flexible planning by integrating multilevel reasoning 126
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection 126
Special Issue of the Journal of Symbolic Computation onCalculemus-99: Integrating Computation and Deduction - Foreword of the Guest Editors 125
Formal Analysis of a Privacy-Preserving Billing Protocol 125
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 123
Software Model Checking using Linear Constraints 123
Automatic Compilation of Protocol Insecurity Problems into Logic Programming 123
Proving formulas through reduction to decidable classes 121
System Description: RDL Rewrite and Decision procedure Laboratory 120
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations 120
Constraint Contextual Rewriting 119
Securing the ``Bring Your Own Device'' Paradigm 119
Totale 14.835
Categoria #
all - tutte 58.943
article - articoli 21.580
book - libri 0
conference - conferenze 30.571
curatela - curatele 1.038
other - altro 0
patent - brevetti 137
selected - selezionate 0
volume - volumi 5.617
Totale 117.886


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021321 0 0 0 0 0 0 0 0 0 140 89 92
2021/20221.760 34 169 202 191 62 91 140 414 56 118 113 170
2022/20231.590 158 62 19 122 274 325 15 130 295 13 134 43
2023/2024812 48 133 30 107 60 145 43 54 36 19 34 103
2024/20252.422 60 215 68 133 363 267 163 438 62 95 217 341
2025/20263.610 583 111 292 337 502 421 641 194 285 244 0 0
Totale 19.274