Ceccato, Mariano
 Distribuzione geografica
Continente #
EU - Europa 35
NA - Nord America 5
AS - Asia 4
Totale 44
Nazione #
IT - Italia 29
CZ - Repubblica Ceca 5
US - Stati Uniti d'America 5
IN - India 4
NL - Olanda 1
Totale 44
Città #
Trento 27
Nagercoil 4
Cheyenne 1
Council Bluffs 1
Flagstaff 1
Los Angeles 1
Milan 1
Totale 36
Nome #
On the need for more human studies to assess software protection, file ddb241a5-1b62-ba8a-e053-3a05fe0afd55 8
Security Testing of the Communication among Android Applications, file ddb241a5-1c65-ba8a-e053-3a05fe0afd55 5
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes, file ddb241a5-3143-ba8a-e053-3a05fe0afd55 4
Towards in-vivo testing of mobile apps, file ddb241a5-6b8a-ba8a-e053-3a05fe0afd55 4
Towards a Unified Software Attack Model to Assess Software Protections, file ddb241a5-1c64-ba8a-e053-3a05fe0afd55 3
Assessment of Data Obfuscation with Residue Number Coding, file ddb241a5-251a-ba8a-e053-3a05fe0afd55 2
Identifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis, file ddb241a5-2859-ba8a-e053-3a05fe0afd55 2
How professional hackers understand protected code while performing attack tasks, file ddb241a5-47cd-ba8a-e053-3a05fe0afd55 2
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps, file ddb241a5-53c2-ba8a-e053-3a05fe0afd55 2
Revealing malicious remote engineering attempts on Android apps with magic numbers, file ddb241a5-6b28-ba8a-e053-3a05fe0afd55 2
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency, file ddb241a5-2cfa-ba8a-e053-3a05fe0afd55 1
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities, file ddb241a5-332f-ba8a-e053-3a05fe0afd55 1
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams, file ddb241a5-333a-ba8a-e053-3a05fe0afd55 1
Search Based Clustering for Protecting Software with Diversified Updates, file ddb241a5-3884-ba8a-e053-3a05fe0afd55 1
Reactive attestation: Automatic detection and reaction to software tampering attacks, file ddb241a5-3886-ba8a-e053-3a05fe0afd55 1
The ASPIRE Framework for Software Protection, file ddb241a5-39fd-ba8a-e053-3a05fe0afd55 1
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation, file ddb241a5-4313-ba8a-e053-3a05fe0afd55 1
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge, file ddb241a5-5460-ba8a-e053-3a05fe0afd55 1
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps, file ddb241a5-5c34-ba8a-e053-3a05fe0afd55 1
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries, file ddb241a5-6389-ba8a-e053-3a05fe0afd55 1
Totale 44
Categoria #
all - tutte 75
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 75


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20206 0 0 0 0 1 3 0 2 0 0 0 0
2021/20225 0 0 0 0 0 0 0 0 0 0 0 5
2022/202311 0 0 0 2 2 0 1 1 5 0 0 0
Totale 44