Ceccato, Mariano
 Distribuzione geografica
Continente #
NA - Nord America 2.762
EU - Europa 1.452
AS - Asia 492
Continente sconosciuto - Info sul continente non disponibili 16
SA - Sud America 7
AF - Africa 4
OC - Oceania 1
Totale 4.734
Nazione #
US - Stati Uniti d'America 2.747
DE - Germania 354
UA - Ucraina 280
SE - Svezia 202
IT - Italia 168
HK - Hong Kong 159
FI - Finlandia 153
CN - Cina 115
VN - Vietnam 102
IE - Irlanda 81
IN - India 79
GB - Regno Unito 77
RU - Federazione Russa 45
BE - Belgio 42
FR - Francia 24
EU - Europa 16
CA - Canada 14
SG - Singapore 11
NL - Olanda 8
BR - Brasile 7
JP - Giappone 4
LB - Libano 4
CH - Svizzera 3
CZ - Repubblica Ceca 3
GR - Grecia 3
KR - Corea 3
SI - Slovenia 3
ID - Indonesia 2
JO - Giordania 2
MW - Malawi 2
PK - Pakistan 2
PT - Portogallo 2
RO - Romania 2
TR - Turchia 2
AE - Emirati Arabi Uniti 1
AU - Australia 1
BZ - Belize 1
IL - Israele 1
IR - Iran 1
KZ - Kazakistan 1
MY - Malesia 1
NO - Norvegia 1
PL - Polonia 1
SA - Arabia Saudita 1
SC - Seychelles 1
TW - Taiwan 1
TZ - Tanzania 1
Totale 4.734
Città #
Chandler 633
Jacksonville 605
Hong Kong 158
Wilmington 149
Ashburn 139
Ann Arbor 123
Dong Ket 101
Kronberg 84
Boardman 82
Dublin 81
Trento 80
Helsinki 79
Dearborn 74
Woodbridge 51
Brussels 41
Beijing 36
Pune 30
Houston 25
Phoenix 24
New York 23
Redwood City 19
Seattle 19
Fuzhou 18
Shanghai 16
Los Angeles 15
Milan 14
Norwalk 13
Verona 12
Brooklyn 11
Mountain View 11
Singapore 11
Nanjing 9
Strasbourg 9
Falls Church 7
Saint Petersburg 7
Hanover 6
Leawood 6
San Mateo 6
Cologne 5
Munich 5
Ottawa 5
Portland 5
Toronto 5
Wuhan 5
Auburn Hills 4
Falkenstein 4
Fremont 4
Genoa 4
Hangzhou 4
Kunming 4
Redmond 4
Augusta 3
Bilovice nad Svitavou 3
Cambridge 3
Fairfield 3
Gunzenhausen 3
Hefei 3
Ljubljana 3
St Petersburg 3
Aachen 2
Crevacuore 2
Ferrara 2
Fukuoka 2
Harbin 2
Islamabad 2
Jinan 2
Lugano 2
Nanchang 2
Padova 2
Quzhou 2
Rome 2
Roverbella 2
Shenzhen 2
Tappahannock 2
Tegal 2
Timisoara 2
Trois-Rivières 2
Abu Dhabi 1
Arco 1
Astana 1
Athens 1
Belize City 1
Camaçari 1
Carol Stream 1
Cazzano 1
Cento 1
Central 1
College Station 1
Costa Mesa 1
Delhi 1
Derby 1
Des Moines 1
Gent 1
Guangzhou 1
Hanoi 1
Jaipur 1
Kingston 1
Kraków 1
Lawrence 1
London 1
Totale 2.968
Nome #
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge 103
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes 100
A Measurement Framework to Quantify Software Protections 89
Ahab's leg dilemma: on the design of a controlled experiment 83
Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities 82
MIGRAZIONE DI SISTEMI SOFTWARE LEGACY 76
Security Testing of Web Applications: A Research Plan 75
A Qualitative Comparison of Three Aspect Mining Techniques 73
Towards a Security Oracle Based on Tree Kernel Methods 72
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries 72
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps 72
Goto elimination strategies in the migration of legacy code to java 71
How Design Notations affect the Comprehension of Web Applications 69
Automated Assistance to the Security Assessment of API for Financial Services 69
Towards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach 67
POSTER: A measurement framework to quantify software protections 66
Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities 66
Assessment of Data Obfuscation with Residue Number Coding 66
Applying and Combining Three Different Aspect Mining Techniques 65
Assessment of Source Code Obfuscation Techniques 65
Security Testing of the Communication among Android Applications 64
Towards Security Testing with Taint Analysis and Genetic Algorithms 63
An Empirical Study about the Effectiveness of Debugging When Random Test Cases Are Used 62
A large study on the effect of code obfuscation on the quality of java code 62
How professional hackers understand protected code while performing attack tasks 61
Migrating Interface Implementations to Aspects 60
The use of executable Fit tables to support maintenance and evolution tasks 60
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency 59
An empirical study on the usefulness of Conallen`s stereotypes in Web application comprehension 58
Aspect Mining through the Formal Concept Analysis of Execution Traces 58
Grammar Based Oracle for Security Testing of Web Applications 58
Security testing of second order permission re-delegation vulnerabilities in Android apps 58
Migrating Object Oriented code to Aspect Oriented Programming 57
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques 57
Towards in-vivo testing of mobile apps 57
Data Model Reverse Engineering in Migrating a Legacy System to Java 55
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: a Series of Four Experiments 55
Inference of a structured data model in migrating a legacy system to Java 54
Refactoring the Aspectizable Interfaces: an Empirical Assessment 54
Adding Distribution to Existing Applications by means of Aspect Oriented Programming 53
Automated Recfactoring of Object Oriented Code into Aspects 53
Circe: A grammar-based oracle for testing Cross-site scripting in web applications 53
Security Oracle Based on Tree Kernel Methods 53
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation 53
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps 53
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps 53
Migrating legacy data structures based on variable overlay to Java 53
Identifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis 53
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects 52
Measuring the Effects of Software Aspectization 52
Barrier Slicing for Remote Software Trusting 52
Automated Pointcut Extraction 52
Talking Tests: an Empirical Assessment of the Role of Fit Acceptance Tests in Clarifying Requirements 51
Remote entrusting by run-time software authentication 50
The Role of Experience and Ability in Comprehension Tasks supported by UML Stereotypes 50
Automated Refactoring of Object Oriented Code into Aspects 49
Automatic Support for the Migration Towards Aspects 49
On the need for more human studies to assess software protection 49
Dynamic aspect mining 49
Workshop on maintenance of aspect oriented systems 48
Codebender: Remote software protection using orthogonal replacement 47
How Smartphone Users Assess the Value/Risk Trade-Off of Apps: An Observational Study 47
Is AOP code easier or harder to test than OOP code? 46
Experimental comparison of features and classifiers for Android malware detection 46
Migrating Object Oriented code to Aspect Oriented Programming 45
Towards experimental evaluation of code obfuscation techniques 45
Recovering structured data types from a legacy data model with overlays 45
Revealing malicious remote engineering attempts on Android apps with magic numbers 45
Towards a Unified Software Attack Model to Assess Software Protections 44
The Effectiveness of Source Code Obfuscation: an Experimental Assessment 44
Using Program Transformations to Add Structure to a Legacy Data Model 43
Distributing trust verification to increase application performance 42
Reactive attestation: Automatic detection and reaction to software tampering attacks 42
Remote software protection by orthogonal client replacement 41
Are Fit tables really talking? A series of experiments to understand whether Fit tables are useful during evolution tasks 41
Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012 40
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams 40
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system 39
A Reference Architecture for Software Protection 39
A Framework for In-Vivo Testing of Mobile Applications 37
Security analysis of permission re-delegation vulnerabilities in Android apps 37
Trading-off security and performance in barrier slicing for remote software entrusting 36
Search Based Clustering for Protecting Software with Diversified Updates 34
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities 33
The ASPIRE Framework for Software Protection 33
A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development 30
Using acceptance tests as a support for clarifying requirements: A series of experiments 30
Do Mobile-App Users Care about Privacy? 30
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations 27
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging 11
Totale 4.852
Categoria #
all - tutte 25.941
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 25.941


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/201941 0 0 0 0 0 0 0 0 0 12 24 5
2019/2020836 86 79 7 9 113 69 124 26 122 50 104 47
2020/2021918 117 0 93 43 94 74 120 14 25 157 36 145
2021/2022426 22 8 13 46 18 10 17 72 38 12 41 129
2022/20231.293 42 101 30 227 84 195 11 96 297 114 69 27
2023/2024711 101 35 75 38 55 74 33 116 17 167 0 0
Totale 4.852