Ceccato, Mariano
 Distribuzione geografica
Continente #
NA - Nord America 3.774
EU - Europa 2.458
AS - Asia 2.075
SA - Sud America 534
AF - Africa 46
Continente sconosciuto - Info sul continente non disponibili 16
OC - Oceania 1
Totale 8.904
Nazione #
US - Stati Uniti d'America 3.669
SG - Singapore 815
RU - Federazione Russa 724
BR - Brasile 483
HK - Hong Kong 453
DE - Germania 416
CN - Cina 387
UA - Ucraina 279
SE - Svezia 204
IT - Italia 192
FI - Finlandia 175
VN - Vietnam 166
GB - Regno Unito 124
IN - India 103
NL - Olanda 86
IE - Irlanda 82
CA - Canada 61
BE - Belgio 47
FR - Francia 40
MX - Messico 28
BD - Bangladesh 24
JP - Giappone 24
PL - Polonia 24
AR - Argentina 22
ZA - Sudafrica 17
EU - Europa 16
LT - Lituania 13
ES - Italia 12
IQ - Iraq 12
TR - Turchia 12
CZ - Repubblica Ceca 10
PK - Pakistan 10
AT - Austria 9
UZ - Uzbekistan 8
MA - Marocco 7
SA - Arabia Saudita 7
EC - Ecuador 6
MY - Malesia 6
CH - Svizzera 5
EG - Egitto 5
IL - Israele 5
LB - Libano 5
AE - Emirati Arabi Uniti 4
CL - Cile 4
CO - Colombia 4
DO - Repubblica Dominicana 4
ET - Etiopia 4
ID - Indonesia 4
JO - Giordania 4
NP - Nepal 4
PS - Palestinian Territory 4
VE - Venezuela 4
GR - Grecia 3
KE - Kenya 3
KR - Corea 3
PT - Portogallo 3
PY - Paraguay 3
SI - Slovenia 3
TT - Trinidad e Tobago 3
UY - Uruguay 3
AZ - Azerbaigian 2
BG - Bulgaria 2
CI - Costa d'Avorio 2
JM - Giamaica 2
KG - Kirghizistan 2
KZ - Kazakistan 2
MW - Malawi 2
NO - Norvegia 2
OM - Oman 2
PE - Perù 2
RO - Romania 2
AM - Armenia 1
AO - Angola 1
AU - Australia 1
BB - Barbados 1
BN - Brunei Darussalam 1
BO - Bolivia 1
BZ - Belize 1
CR - Costa Rica 1
CY - Cipro 1
DZ - Algeria 1
GD - Grenada 1
GY - Guiana 1
HN - Honduras 1
HU - Ungheria 1
IR - Iran 1
KH - Cambogia 1
NI - Nicaragua 1
PA - Panama 1
QA - Qatar 1
SC - Seychelles 1
SN - Senegal 1
SR - Suriname 1
TN - Tunisia 1
TW - Taiwan 1
TZ - Tanzania 1
Totale 8.904
Città #
Chandler 618
Jacksonville 599
Hong Kong 451
Singapore 429
Ashburn 255
Moscow 218
Wilmington 148
Boardman 132
The Dalles 127
Ann Arbor 123
Beijing 123
Dallas 101
Dong Ket 100
Helsinki 93
Hefei 92
Kronberg 83
Dublin 82
Trento 82
Dearborn 73
Los Angeles 71
New York 52
Woodbridge 51
Brussels 46
São Paulo 43
Munich 42
Phoenix 34
Pune 30
Brooklyn 27
Houston 26
Seattle 24
Santa Clara 23
Tokyo 20
Warsaw 20
Fuzhou 19
Ho Chi Minh City 19
Redwood City 19
Milan 17
Montreal 17
Shanghai 17
Chennai 16
Hanoi 15
Toronto 15
Belo Horizonte 13
Falkenstein 13
Miami 13
Norwalk 13
Verona 13
Atlanta 12
Johannesburg 12
Chicago 11
Mexico City 11
Mountain View 11
Ottawa 11
Poplar 11
Secaucus 11
Denver 10
Frankfurt am Main 10
Boston 9
Brasília 9
London 9
Nanjing 9
Turku 9
Assago 8
Curitiba 8
Rio de Janeiro 8
Stockholm 8
Strasbourg 8
Tashkent 8
Campinas 7
Falls Church 7
Saint Petersburg 7
Amsterdam 6
Hanover 6
Kunming 6
Leawood 6
San Mateo 6
Santo André 6
Vienna 6
Wuhan 6
Augusta 5
Betim 5
Brno 5
Buenos Aires 5
Cologne 5
Hillsboro 5
Manchester 5
Orem 5
Osasco 5
Portland 5
Querétaro 5
São Bernardo do Campo 5
Araçatuba 4
Auburn Hills 4
Calgary 4
Casablanca 4
Chapecó 4
Columbus 4
Dhaka 4
Fremont 4
Genoa 4
Totale 5.025
Nome #
Revealing malicious remote engineering attempts on Android apps with magic numbers 320
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge 307
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes 161
A Qualitative Comparison of Three Aspect Mining Techniques 159
A Measurement Framework to Quantify Software Protections 155
Automated Assistance to the Security Assessment of API for Financial Services 141
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps 129
Assessment of Data Obfuscation with Residue Number Coding 127
An Empirical Study about the Effectiveness of Debugging When Random Test Cases Are Used 126
Security Testing of Web Applications: A Research Plan 124
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps 124
Towards a Security Oracle Based on Tree Kernel Methods 123
Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities 121
Towards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach 121
A large study on the effect of code obfuscation on the quality of java code 120
Applying and Combining Three Different Aspect Mining Techniques 119
MIGRAZIONE DI SISTEMI SOFTWARE LEGACY 117
An empirical study on the usefulness of Conallen`s stereotypes in Web application comprehension 116
Assessment of Source Code Obfuscation Techniques 115
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques 114
Aspect Mining through the Formal Concept Analysis of Execution Traces 110
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation 108
Grammar Based Oracle for Security Testing of Web Applications 107
Security Testing of the Communication among Android Applications 107
Security testing of second order permission re-delegation vulnerabilities in Android apps 107
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries 106
How Design Notations affect the Comprehension of Web Applications 105
Automated Recfactoring of Object Oriented Code into Aspects 104
Goto elimination strategies in the migration of legacy code to java 104
Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities 104
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps 104
Towards Security Testing with Taint Analysis and Genetic Algorithms 102
Identifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis 102
Adding Distribution to Existing Applications by means of Aspect Oriented Programming 101
Automated Pointcut Extraction 101
Security analysis of permission re-delegation vulnerabilities in Android apps 100
Circe: A grammar-based oracle for testing Cross-site scripting in web applications 99
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency 99
A Framework for In-Vivo Testing of Mobile Applications 98
Barrier Slicing for Remote Software Trusting 97
Using Program Transformations to Add Structure to a Legacy Data Model 97
Remote entrusting by run-time software authentication 96
The use of executable Fit tables to support maintenance and evolution tasks 96
Security Oracle Based on Tree Kernel Methods 95
Towards in-vivo testing of mobile apps 95
POSTER: A measurement framework to quantify software protections 94
Migrating Interface Implementations to Aspects 93
Inference of a structured data model in migrating a legacy system to Java 93
Automated Refactoring of Object Oriented Code into Aspects 92
Search Based Clustering for Protecting Software with Diversified Updates 92
Are Fit tables really talking? A series of experiments to understand whether Fit tables are useful during evolution tasks 92
Data Model Reverse Engineering in Migrating a Legacy System to Java 91
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: a Series of Four Experiments 90
Experimental comparison of features and classifiers for Android malware detection 90
Refactoring the Aspectizable Interfaces: an Empirical Assessment 89
Talking Tests: an Empirical Assessment of the Role of Fit Acceptance Tests in Clarifying Requirements 89
Migrating Object Oriented code to Aspect Oriented Programming 87
On the need for more human studies to assess software protection 87
Migrating legacy data structures based on variable overlay to Java 87
A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development 85
How professional hackers understand protected code while performing attack tasks 85
Recovering structured data types from a legacy data model with overlays 84
How Smartphone Users Assess the Value/Risk Trade-Off of Apps: An Observational Study 84
A Reference Architecture for Software Protection 83
Measuring the Effects of Software Aspectization 82
Workshop on maintenance of aspect oriented systems 82
Migrating Object Oriented code to Aspect Oriented Programming 82
Towards experimental evaluation of code obfuscation techniques 82
Is AOP code easier or harder to test than OOP code? 82
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects 80
Automatic Support for the Migration Towards Aspects 80
The Effectiveness of Source Code Obfuscation: an Experimental Assessment 80
Dynamic aspect mining 79
Codebender: Remote software protection using orthogonal replacement 76
Towards a Unified Software Attack Model to Assess Software Protections 76
Reactive attestation: Automatic detection and reaction to software tampering attacks 76
The Role of Experience and Ability in Comprehension Tasks supported by UML Stereotypes 76
Remote software protection by orthogonal client replacement 75
Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012 73
Distributing trust verification to increase application performance 72
Using acceptance tests as a support for clarifying requirements: A series of experiments 72
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging 68
Trading-off security and performance in barrier slicing for remote software entrusting 68
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities 68
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations 67
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams 67
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system 66
The ASPIRE Framework for Software Protection 63
Do Mobile-App Users Care about Privacy? 59
Totale 9.021
Categoria #
all - tutte 49.085
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 49.085


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021564 0 0 0 0 0 74 119 14 25 154 35 143
2021/2022418 22 8 13 44 18 10 17 71 38 12 39 126
2022/20231.269 41 94 28 224 82 193 11 95 294 111 69 27
2023/2024789 100 35 72 37 55 69 32 115 17 165 9 83
2024/20252.503 21 19 161 68 250 68 80 136 787 243 459 211
2025/20261.657 232 339 352 384 306 44 0 0 0 0 0 0
Totale 9.021