Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 8.203
EU - Europa 6.537
AS - Asia 4.222
SA - Sud America 1.480
AF - Africa 154
OC - Oceania 50
Continente sconosciuto - Info sul continente non disponibili 35
AN - Antartide 1
Totale 20.682
Nazione #
US - Stati Uniti d'America 7.875
RU - Federazione Russa 1.680
SG - Singapore 1.673
IT - Italia 1.362
BR - Brasile 1.279
DE - Germania 883
CN - Cina 861
HK - Hong Kong 586
UA - Ucraina 475
SE - Svezia 400
FI - Finlandia 336
VN - Vietnam 323
GB - Regno Unito 317
NL - Olanda 254
IN - India 237
CA - Canada 223
IE - Irlanda 194
FR - Francia 175
BE - Belgio 91
PL - Polonia 87
MX - Messico 78
AR - Argentina 76
JP - Giappone 73
ES - Italia 69
BD - Bangladesh 54
ZA - Sudafrica 49
IR - Iran 47
TR - Turchia 44
PK - Pakistan 42
AU - Australia 41
IQ - Iraq 37
ID - Indonesia 35
AT - Austria 32
EU - Europa 32
KR - Corea 28
SA - Arabia Saudita 28
EC - Ecuador 27
LT - Lituania 25
NG - Nigeria 22
CO - Colombia 21
MY - Malesia 21
PE - Perù 19
CL - Cile 18
IL - Israele 17
VE - Venezuela 17
GR - Grecia 16
UZ - Uzbekistan 16
EG - Egitto 15
KE - Kenya 15
MA - Marocco 13
NO - Norvegia 13
BY - Bielorussia 12
DZ - Algeria 12
AE - Emirati Arabi Uniti 11
CH - Svizzera 11
PT - Portogallo 11
AZ - Azerbaigian 10
BA - Bosnia-Erzegovina 10
CZ - Repubblica Ceca 10
NP - Nepal 10
PY - Paraguay 10
SI - Slovenia 10
TW - Taiwan 10
DK - Danimarca 9
RO - Romania 9
TN - Tunisia 9
JO - Giordania 8
LU - Lussemburgo 8
NZ - Nuova Zelanda 8
PH - Filippine 8
HN - Honduras 7
HU - Ungheria 7
UY - Uruguay 7
BO - Bolivia 6
LB - Libano 6
OM - Oman 6
SN - Senegal 6
DO - Repubblica Dominicana 5
KZ - Kazakistan 5
LK - Sri Lanka 5
TH - Thailandia 5
AL - Albania 4
BH - Bahrain 4
EE - Estonia 4
HR - Croazia 4
LV - Lettonia 4
PA - Panama 4
RS - Serbia 4
SK - Slovacchia (Repubblica Slovacca) 4
BG - Bulgaria 3
BN - Brunei Darussalam 3
CR - Costa Rica 3
QA - Qatar 3
BB - Barbados 2
ET - Etiopia 2
GE - Georgia 2
JM - Giamaica 2
KG - Kirghizistan 2
MD - Moldavia 2
RW - Ruanda 2
Totale 20.660
Città #
Chandler 1.310
Singapore 958
Jacksonville 947
Ashburn 564
Hong Kong 561
Dallas 552
Trento 518
Moscow 408
The Dalles 300
Beijing 294
Boardman 270
Wilmington 228
Los Angeles 216
Helsinki 196
Hefei 195
Dublin 185
New York 181
Kronberg 172
Dong Ket 151
Brooklyn 120
Ann Arbor 116
Dearborn 114
São Paulo 109
Munich 92
Ottawa 86
Phoenix 78
Santa Clara 73
Brussels 70
Warsaw 70
Woodbridge 68
Milan 67
Montreal 59
Redwood City 59
Ho Chi Minh City 55
Houston 54
Denver 53
Shanghai 53
Pune 51
Tokyo 51
Assago 50
Hanoi 49
Seattle 49
Verona 48
Campogalliano 47
Falkenstein 46
Atlanta 44
London 43
Poplar 38
Mexico City 36
Secaucus 36
Orem 35
Rio de Janeiro 35
Chicago 34
Cheyenne 32
Johannesburg 32
Miami 32
Rome 32
Stockholm 32
Belo Horizonte 30
Chennai 30
Fremont 29
Toronto 29
Turku 29
Hanover 25
Amsterdam 24
Curitiba 24
Frankfurt am Main 24
Ardabil 23
Brasília 23
Columbus 23
Porto Alegre 21
Sydney 21
Neumarkt 20
Tianjin 20
Boston 19
Mumbai 19
San Francisco 19
Manchester 18
Monmouth Junction 18
Mountain View 18
Nuremberg 18
Salvador 18
Shenzhen 18
Guangzhou 17
Bologna 16
Charlotte 16
Padova 16
Ribeirão Preto 16
Norwalk 15
Pergine Valsugana 15
Portland 15
Querétaro 15
Cambridge 14
Des Moines 14
Genoa 14
Istanbul 14
Lima 14
Nairobi 14
Tashkent 14
Ankara 13
Totale 11.266
Nome #
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 410
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection 380
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 254
Intelligent Systems and Formal Methods in Software Engineering 241
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers 225
A First Appraisal of Cryptographic Mechanisms for the SelectiveDisclosure of Verifiable Credentials 220
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 191
A Tool-assisted Methodology for the Data Protection Impact Assessment 190
A Risk-based Approach to Trustworthy AI Systems for Judicial Procedures 176
A delegated authorization solution for smart-city mobile applications 173
Protecting Digital Identity Wallet: A Threat Model in the Age of eIDAS 2.0 173
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations 171
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 167
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 166
A First Appraisal of NIS2 and CRA Compliance Leveraging Open Source Tools 155
Learning from Others’ Mistakes: An Analysis of Cyber-security Incidents 154
A Lazy Approach to Access Control as a Service (ACaaS) for IoT 153
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 153
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints 151
A Superposition Based Methodology to Design Satisfiability Decision Procedures 149
A Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures 147
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience 147
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications 144
Validating Requirements of Access Control for Cloud-Edge IoT Solutions 143
Automated Assistance to the Security Assessment of API for Financial Services 142
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies 138
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 138
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 137
Attribute Based Access Control for APIs in Spring Security 137
A Methodology to build run-time Monitors for Security-Aware Workflows 137
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 137
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments 137
A Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints 131
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 131
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 131
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud 127
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 125
Attestation-enabled secure and scalable routing protocol for IoT networks 125
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies 124
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 123
New results on rewrite-based satisfiability procedures 122
TLSAssistant Goes FINSEC - A Security Platform Integration Extending Threat Intelligence Language 121
ASASP: Automated Symbolic Analysis of Security Policies 120
RDL---Rewrite and Decision procedure Laboratory 119
A Theory of Singly-Linked Lists and its Extensible Decision Procedure 119
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 119
Efficient Theory Combination via Boolean Search 119
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 119
Efficient theory combination via boolean search 118
Abstraction-Driven Verification of Array Programs 117
Scalable Automated Analysis of Access Control and Privacy Policies 116
Model checking: teoria ed applicazioni 116
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 115
SAFARI: SMT-Based Abstraction for Arrays with Interpolants 115
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 115
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 114
Parameterized model checking for security policy analysis 114
A Modular and Extensible Framework for Securing TLS 113
Automatically finding execution scenarios to deploy security-sensitive workflows 113
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem 113
Automated and Efficient Analysis of Role-Based Access Control with Attributes 112
The Phase Transition of the Linear Inequalities Problem 111
Combination of convex theories: Modularity, deduction completeness, and explanation 111
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 110
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 110
High Performance Deduction for verification: a case study in the theory of arrays 109
The eIDAS Regulation: A Survey of Technological Trends for European Electronic Identity Schemes 108
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 108
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 108
Automated Analysis of Infinite State Workflows with Access Control Policies 107
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 107
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 107
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments 107
Beyond Screens: Investigating Identity Proofing for the Metaverse Through Cross-Device Flows 106
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis 106
Enroll, and Authentication Will Follow 105
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols 103
Quantifier-free interpolation in combinations of equality interpolating theories 103
Deciding Extensions of the Theory of Arrays by Integrating Decision Procedures and Instantiation Strategies 102
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 101
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 101
Modularity for Security-Sensitive Workflows 99
Uniform Derivation of Decision Procedures by Superposition 98
The {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk) 98
MCMT: A Model Checker Modulo Theories 97
Selective Release of Smart Metering Data in Multi-domain Smart Grids 97
Analysis of XACML Policies with SMT 97
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 97
Coommunication Protocols for Mathematical Services based on KQML and OMRS 96
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 96
Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices 96
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 96
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 95
Automated Legal Compliance Checking by Security Policy Analysis 95
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 95
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios 94
Verification of Composed Array-based Systems with Applications to Security-Aware Workflows 94
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes 93
Improving Security and Performance of Cryptographic Access Control with Trusted Execution Environments 93
Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS 92
Totale 13.150
Categoria #
all - tutte 105.995
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 105.995


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.072 0 0 0 0 0 110 255 12 120 269 72 234
2021/20221.227 120 69 29 136 52 31 57 206 119 34 131 243
2022/20232.879 117 243 55 482 112 423 42 395 617 212 108 73
2023/20241.920 147 123 158 83 146 209 114 262 81 343 42 212
2024/20255.864 78 112 404 199 113 207 380 431 1.851 729 903 457
2025/20265.114 631 954 1.124 1.319 761 325 0 0 0 0 0 0
Totale 21.244