Ceccato, Mariano
 Distribuzione geografica
Continente #
NA - Nord America 3.185
EU - Europa 2.341
AS - Asia 1.410
SA - Sud America 259
AF - Africa 16
Continente sconosciuto - Info sul continente non disponibili 16
OC - Oceania 1
Totale 7.228
Nazione #
US - Stati Uniti d'America 3.141
RU - Federazione Russa 734
SG - Singapore 456
HK - Hong Kong 435
DE - Germania 397
UA - Ucraina 283
CN - Cina 260
BR - Brasile 247
SE - Svezia 203
IT - Italia 180
FI - Finlandia 173
VN - Vietnam 102
GB - Regno Unito 90
IN - India 84
NL - Olanda 84
IE - Irlanda 82
BE - Belgio 47
CA - Canada 31
FR - Francia 25
EU - Europa 16
JP - Giappone 13
CZ - Repubblica Ceca 11
TR - Turchia 8
AT - Austria 6
LT - Lituania 6
PK - Pakistan 6
BD - Bangladesh 5
IQ - Iraq 5
MX - Messico 5
JO - Giordania 4
LB - Libano 4
ZA - Sudafrica 4
AR - Argentina 3
CH - Svizzera 3
DO - Repubblica Dominicana 3
GR - Grecia 3
IL - Israele 3
KR - Corea 3
MA - Marocco 3
MY - Malesia 3
PL - Polonia 3
SI - Slovenia 3
AZ - Azerbaigian 2
CI - Costa d'Avorio 2
CO - Colombia 2
EG - Egitto 2
ID - Indonesia 2
KG - Kirghizistan 2
KZ - Kazakistan 2
MW - Malawi 2
NO - Norvegia 2
NP - Nepal 2
PT - Portogallo 2
RO - Romania 2
VE - Venezuela 2
AE - Emirati Arabi Uniti 1
AO - Angola 1
AU - Australia 1
BN - Brunei Darussalam 1
BO - Bolivia 1
BZ - Belize 1
CL - Cile 1
CR - Costa Rica 1
CY - Cipro 1
EC - Ecuador 1
ES - Italia 1
HN - Honduras 1
HU - Ungheria 1
IR - Iran 1
JM - Giamaica 1
OM - Oman 1
PE - Perù 1
PS - Palestinian Territory 1
PY - Paraguay 1
SA - Arabia Saudita 1
SC - Seychelles 1
TT - Trinidad e Tobago 1
TW - Taiwan 1
TZ - Tanzania 1
UZ - Uzbekistan 1
Totale 7.228
Città #
Chandler 633
Jacksonville 605
Hong Kong 433
Moscow 218
Singapore 195
Wilmington 149
Ashburn 142
Boardman 134
Ann Arbor 123
The Dalles 114
Dong Ket 101
Helsinki 94
Hefei 93
Kronberg 84
Dublin 82
Trento 82
Dearborn 74
Woodbridge 51
Brussels 46
Beijing 36
Los Angeles 30
Pune 30
Phoenix 28
New York 27
Houston 25
Munich 24
Seattle 21
Brooklyn 20
Fuzhou 19
Redwood City 19
Shanghai 17
São Paulo 17
Milan 15
Santa Clara 15
Toronto 14
Falkenstein 13
Miami 13
Norwalk 13
Verona 13
Mountain View 11
Ottawa 11
Nanjing 9
Strasbourg 9
Tokyo 9
Belo Horizonte 8
Falls Church 7
Saint Petersburg 7
Brno 6
Frankfurt am Main 6
Hanover 6
Kunming 6
Leawood 6
London 6
San Mateo 6
Wuhan 6
Augusta 5
Cologne 5
Portland 5
Rio de Janeiro 5
Turku 5
Assago 4
Auburn Hills 4
Chennai 4
Fremont 4
Genoa 4
Hangzhou 4
Londrina 4
Redmond 4
Santo André 4
Shenzhen 4
Araçatuba 3
Betim 3
Bilovice nad Svitavou 3
Cambridge 3
Campina Grande 3
Campinas 3
Contagem 3
Council Bluffs 3
Curitiba 3
Fairfield 3
Guangzhou 3
Gunzenhausen 3
Harbin 3
Ljubljana 3
Niterói 3
Osasco 3
Padova 3
Recife 3
St Petersburg 3
São José do Rio Preto 3
São José dos Campos 3
Vienna 3
Aachen 2
Abidjan 2
Amman 2
Amsterdam 2
Aracaju 2
Atlanta 2
Baku 2
Bishkek 2
Totale 4.128
Nome #
Revealing malicious remote engineering attempts on Android apps with magic numbers 297
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge 254
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes 133
A Measurement Framework to Quantify Software Protections 123
Ahab's leg dilemma: on the design of a controlled experiment 120
A Qualitative Comparison of Three Aspect Mining Techniques 111
Automated Assistance to the Security Assessment of API for Financial Services 109
Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities 104
MIGRAZIONE DI SISTEMI SOFTWARE LEGACY 100
Security Testing of Web Applications: A Research Plan 98
Towards a Security Oracle Based on Tree Kernel Methods 98
An Empirical Study about the Effectiveness of Debugging When Random Test Cases Are Used 95
Applying and Combining Three Different Aspect Mining Techniques 94
Assessment of Source Code Obfuscation Techniques 94
AnFlo: Detecting Anomalous Sensitive Information Flows in Android Apps 94
Towards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach 93
Assessment of Data Obfuscation with Residue Number Coding 93
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps 92
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps 92
An empirical study on the usefulness of Conallen`s stereotypes in Web application comprehension 91
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques 91
How Design Notations affect the Comprehension of Web Applications 89
Goto elimination strategies in the migration of legacy code to java 88
Security Testing of the Communication among Android Applications 88
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries 88
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency 86
POSTER: A measurement framework to quantify software protections 84
Towards Security Testing with Taint Analysis and Genetic Algorithms 84
Barrier Slicing for Remote Software Trusting 83
A large study on the effect of code obfuscation on the quality of java code 83
Aspect Mining through the Formal Concept Analysis of Execution Traces 82
Security Testing of Web Applications: a Search Based Approach for Cross-Site Scripting Vulnerabilities 82
The use of executable Fit tables to support maintenance and evolution tasks 81
Towards in-vivo testing of mobile apps 81
Grammar Based Oracle for Security Testing of Web Applications 80
Inference of a structured data model in migrating a legacy system to Java 79
Identifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis 79
Security testing of second order permission re-delegation vulnerabilities in Android apps 79
Migrating Interface Implementations to Aspects 78
Adding Distribution to Existing Applications by means of Aspect Oriented Programming 78
Circe: A grammar-based oracle for testing Cross-site scripting in web applications 76
Automated Pointcut Extraction 76
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation 76
Migrating Object Oriented code to Aspect Oriented Programming 75
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: a Series of Four Experiments 75
How professional hackers understand protected code while performing attack tasks 75
Migrating legacy data structures based on variable overlay to Java 75
Automated Recfactoring of Object Oriented Code into Aspects 74
Remote entrusting by run-time software authentication 74
Refactoring the Aspectizable Interfaces: an Empirical Assessment 74
Talking Tests: an Empirical Assessment of the Role of Fit Acceptance Tests in Clarifying Requirements 74
Data Model Reverse Engineering in Migrating a Legacy System to Java 74
The Effectiveness of Source Code Obfuscation: an Experimental Assessment 74
A Framework for In-Vivo Testing of Mobile Applications 74
Automated Refactoring of Object Oriented Code into Aspects 73
On the need for more human studies to assess software protection 71
Experimental comparison of features and classifiers for Android malware detection 71
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects 70
Measuring the Effects of Software Aspectization 70
Automatic Support for the Migration Towards Aspects 70
Security Oracle Based on Tree Kernel Methods 70
Security analysis of permission re-delegation vulnerabilities in Android apps 70
Workshop on maintenance of aspect oriented systems 68
How Smartphone Users Assess the Value/Risk Trade-Off of Apps: An Observational Study 68
Dynamic aspect mining 68
Is AOP code easier or harder to test than OOP code? 67
Recovering structured data types from a legacy data model with overlays 66
Migrating Object Oriented code to Aspect Oriented Programming 65
Towards experimental evaluation of code obfuscation techniques 65
The Role of Experience and Ability in Comprehension Tasks supported by UML Stereotypes 65
Are Fit tables really talking? A series of experiments to understand whether Fit tables are useful during evolution tasks 64
Remote software protection by orthogonal client replacement 63
A Reference Architecture for Software Protection 63
Codebender: Remote software protection using orthogonal replacement 62
Towards a Unified Software Attack Model to Assess Software Protections 62
Using Program Transformations to Add Structure to a Legacy Data Model 62
A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development 60
Trading-off security and performance in barrier slicing for remote software entrusting 60
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams 60
Reactive attestation: Automatic detection and reaction to software tampering attacks 60
Distributing trust verification to increase application performance 59
Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012 57
Using acceptance tests as a support for clarifying requirements: A series of experiments 56
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities 56
Search Based Clustering for Protecting Software with Diversified Updates 56
The ASPIRE Framework for Software Protection 55
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system 54
Do Mobile-App Users Care about Privacy? 54
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations 49
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging 43
Totale 7.346
Categoria #
all - tutte 42.302
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 42.302


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202047 0 0 0 0 0 0 0 0 0 0 0 47
2020/2021918 117 0 93 43 94 74 120 14 25 157 36 145
2021/2022426 22 8 13 46 18 10 17 72 38 12 41 129
2022/20231.293 42 101 30 227 84 195 11 96 297 114 69 27
2023/2024806 101 35 75 38 55 74 33 116 17 167 9 86
2024/20252.399 22 19 165 70 250 71 81 137 800 245 466 73
Totale 7.346