Ceccato, Mariano
 Distribuzione geografica
Continente #
NA - Nord America 2.923
EU - Europa 1.498
AS - Asia 679
Continente sconosciuto - Info sul continente non disponibili 16
AF - Africa 8
SA - Sud America 8
OC - Oceania 1
Totale 5.133
Nazione #
US - Stati Uniti d'America 2.897
DE - Germania 369
UA - Ucraina 280
SE - Svezia 202
HK - Hong Kong 191
IT - Italia 170
FI - Finlandia 157
SG - Singapore 135
CN - Cina 134
VN - Vietnam 102
GB - Regno Unito 82
IE - Irlanda 82
IN - India 79
BE - Belgio 45
RU - Federazione Russa 45
FR - Francia 25
CA - Canada 23
EU - Europa 16
CZ - Repubblica Ceca 11
NL - Olanda 11
JP - Giappone 8
BR - Brasile 7
LB - Libano 4
CH - Svizzera 3
GR - Grecia 3
JO - Giordania 3
KR - Corea 3
LT - Lituania 3
MY - Malesia 3
SI - Slovenia 3
TR - Turchia 3
EG - Egitto 2
ID - Indonesia 2
IL - Israele 2
KZ - Kazakistan 2
MW - Malawi 2
PK - Pakistan 2
PT - Portogallo 2
RO - Romania 2
AE - Emirati Arabi Uniti 1
AT - Austria 1
AU - Australia 1
AZ - Azerbaigian 1
BZ - Belize 1
DO - Repubblica Dominicana 1
IR - Iran 1
JM - Giamaica 1
KG - Kirghizistan 1
MA - Marocco 1
NO - Norvegia 1
PE - Perù 1
PL - Polonia 1
SA - Arabia Saudita 1
SC - Seychelles 1
TW - Taiwan 1
TZ - Tanzania 1
ZA - Sudafrica 1
Totale 5.133
Città #
Chandler 633
Jacksonville 605
Hong Kong 190
Wilmington 149
Ashburn 141
Boardman 134
Ann Arbor 123
Singapore 104
Dong Ket 101
Kronberg 84
Helsinki 83
Dublin 82
Trento 82
Dearborn 74
Woodbridge 51
Brussels 44
Beijing 36
Pune 30
Phoenix 26
Houston 25
New York 23
Los Angeles 22
Munich 19
Redwood City 19
Seattle 19
Fuzhou 18
Shanghai 16
Milan 14
Miami 13
Norwalk 13
Verona 12
Brooklyn 11
Mountain View 11
Toronto 11
Nanjing 9
Santa Clara 9
Strasbourg 9
Ottawa 8
Falls Church 7
Saint Petersburg 7
Brno 6
Hanover 6
Leawood 6
San Mateo 6
Cologne 5
Kunming 5
Portland 5
Wuhan 5
Auburn Hills 4
Falkenstein 4
Fremont 4
Genoa 4
Hangzhou 4
London 4
Redmond 4
Shenzhen 4
Tokyo 4
Augusta 3
Bilovice nad Svitavou 3
Cambridge 3
Fairfield 3
Gunzenhausen 3
Harbin 3
Hefei 3
Ljubljana 3
St Petersburg 3
Aachen 2
Cairo 2
Council Bluffs 2
Crevacuore 2
Farmingdale 2
Ferrara 2
Fukuoka 2
Islamabad 2
Jinan 2
Lugano 2
Nanchang 2
Padova 2
Quzhou 2
Rome 2
Roverbella 2
Tappahannock 2
Tegal 2
Timisoara 2
Trois-Rivières 2
České Budějovice 2
Abu Dhabi 1
Almaty 1
Amman 1
Arco 1
Astana 1
Athens 1
Baku 1
Belize City 1
Bishkek 1
Camaçari 1
Carol Stream 1
Cazzano 1
Cento 1
Central 1
Totale 3.228
Nome #
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge 112
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes 109
A Measurement Framework to Quantify Software Protections 97
Ahab's leg dilemma: on the design of a controlled experiment 93
A Qualitative Comparison of Three Aspect Mining Techniques 85
Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities 83
Automated Assistance to the Security Assessment of API for Financial Services 80
Security Testing of Web Applications: A Research Plan 78
MIGRAZIONE DI SISTEMI SOFTWARE LEGACY 78
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps 77
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries 75
Towards a Security Oracle Based on Tree Kernel Methods 74
An Empirical Study about the Effectiveness of Debugging When Random Test Cases Are Used 74
Goto elimination strategies in the migration of legacy code to java 73
Assessment of Data Obfuscation with Residue Number Coding 73
Assessment of Source Code Obfuscation Techniques 73
How Design Notations affect the Comprehension of Web Applications 72
Applying and Combining Three Different Aspect Mining Techniques 70
Towards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach 70
POSTER: A measurement framework to quantify software protections 68
Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities 68
Security Testing of the Communication among Android Applications 68
A large study on the effect of code obfuscation on the quality of java code 67
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps 67
Towards Security Testing with Taint Analysis and Genetic Algorithms 65
Aspect Mining through the Formal Concept Analysis of Execution Traces 64
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques 64
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency 64
An empirical study on the usefulness of Conallen`s stereotypes in Web application comprehension 63
The use of executable Fit tables to support maintenance and evolution tasks 63
Migrating Interface Implementations to Aspects 62
How professional hackers understand protected code while performing attack tasks 62
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation 61
Security testing of second order permission re-delegation vulnerabilities in Android apps 61
Grammar Based Oracle for Security Testing of Web Applications 60
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps 60
Towards in-vivo testing of mobile apps 59
Migrating Object Oriented code to Aspect Oriented Programming 58
Adding Distribution to Existing Applications by means of Aspect Oriented Programming 58
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: a Series of Four Experiments 58
Migrating legacy data structures based on variable overlay to Java 58
Identifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis 58
Automated Recfactoring of Object Oriented Code into Aspects 57
Inference of a structured data model in migrating a legacy system to Java 57
Refactoring the Aspectizable Interfaces: an Empirical Assessment 57
Measuring the Effects of Software Aspectization 56
Automated Refactoring of Object Oriented Code into Aspects 56
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects 55
Automatic Support for the Migration Towards Aspects 55
Barrier Slicing for Remote Software Trusting 55
Talking Tests: an Empirical Assessment of the Role of Fit Acceptance Tests in Clarifying Requirements 55
Data Model Reverse Engineering in Migrating a Legacy System to Java 55
Automated Pointcut Extraction 55
Security Oracle Based on Tree Kernel Methods 55
Circe: A grammar-based oracle for testing Cross-site scripting in web applications 54
On the need for more human studies to assess software protection 54
Remote entrusting by run-time software authentication 53
Dynamic aspect mining 53
The Role of Experience and Ability in Comprehension Tasks supported by UML Stereotypes 52
Workshop on maintenance of aspect oriented systems 50
Revealing malicious remote engineering attempts on Android apps with magic numbers 50
Codebender: Remote software protection using orthogonal replacement 49
Towards experimental evaluation of code obfuscation techniques 49
Is AOP code easier or harder to test than OOP code? 49
How Smartphone Users Assess the Value/Risk Trade-Off of Apps: An Observational Study 49
A Framework for In-Vivo Testing of Mobile Applications 49
Experimental comparison of features and classifiers for Android malware detection 49
Migrating Object Oriented code to Aspect Oriented Programming 47
Security analysis of permission re-delegation vulnerabilities in Android apps 47
Towards a Unified Software Attack Model to Assess Software Protections 46
Recovering structured data types from a legacy data model with overlays 46
Reactive attestation: Automatic detection and reaction to software tampering attacks 46
Are Fit tables really talking? A series of experiments to understand whether Fit tables are useful during evolution tasks 46
The Effectiveness of Source Code Obfuscation: an Experimental Assessment 46
Using Program Transformations to Add Structure to a Legacy Data Model 45
Remote software protection by orthogonal client replacement 44
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams 44
Distributing trust verification to increase application performance 43
Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012 43
A Reference Architecture for Software Protection 43
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system 41
A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development 40
Do Mobile-App Users Care about Privacy? 39
Trading-off security and performance in barrier slicing for remote software entrusting 38
Search Based Clustering for Protecting Software with Diversified Updates 37
The ASPIRE Framework for Software Protection 37
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities 36
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations 35
Using acceptance tests as a support for clarifying requirements: A series of experiments 35
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging 17
Totale 5.251
Categoria #
all - tutte 32.979
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 32.979


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020655 0 0 0 0 113 69 124 26 122 50 104 47
2020/2021918 117 0 93 43 94 74 120 14 25 157 36 145
2021/2022426 22 8 13 46 18 10 17 72 38 12 41 129
2022/20231.293 42 101 30 227 84 195 11 96 297 114 69 27
2023/2024806 101 35 75 38 55 74 33 116 17 167 9 86
2024/2025304 22 19 165 70 28 0 0 0 0 0 0 0
Totale 5.251