Ranise, Silvio
 Distribuzione geografica
Continente #
NA - Nord America 8.066
EU - Europa 6.514
AS - Asia 4.188
SA - Sud America 1.474
AF - Africa 151
OC - Oceania 50
Continente sconosciuto - Info sul continente non disponibili 35
AN - Antartide 1
Totale 20.479
Nazione #
US - Stati Uniti d'America 7.751
RU - Federazione Russa 1.680
SG - Singapore 1.658
IT - Italia 1.359
BR - Brasile 1.274
DE - Germania 879
CN - Cina 853
HK - Hong Kong 586
UA - Ucraina 475
SE - Svezia 399
FI - Finlandia 336
VN - Vietnam 323
GB - Regno Unito 311
NL - Olanda 254
IN - India 236
CA - Canada 212
IE - Irlanda 194
FR - Francia 175
BE - Belgio 91
PL - Polonia 81
MX - Messico 76
AR - Argentina 75
ES - Italia 67
JP - Giappone 67
BD - Bangladesh 53
IR - Iran 47
ZA - Sudafrica 46
PK - Pakistan 42
TR - Turchia 42
AU - Australia 41
IQ - Iraq 37
ID - Indonesia 35
AT - Austria 32
EU - Europa 32
KR - Corea 28
EC - Ecuador 27
SA - Arabia Saudita 27
LT - Lituania 24
NG - Nigeria 22
CO - Colombia 21
MY - Malesia 21
PE - Perù 19
CL - Cile 18
IL - Israele 17
VE - Venezuela 17
GR - Grecia 16
UZ - Uzbekistan 16
EG - Egitto 15
KE - Kenya 15
MA - Marocco 13
NO - Norvegia 13
BY - Bielorussia 12
DZ - Algeria 12
AE - Emirati Arabi Uniti 11
CH - Svizzera 11
PT - Portogallo 11
AZ - Azerbaigian 10
BA - Bosnia-Erzegovina 10
CZ - Repubblica Ceca 10
NP - Nepal 10
PY - Paraguay 10
SI - Slovenia 10
TW - Taiwan 10
DK - Danimarca 9
RO - Romania 9
TN - Tunisia 9
JO - Giordania 8
LU - Lussemburgo 8
NZ - Nuova Zelanda 8
PH - Filippine 8
HN - Honduras 7
HU - Ungheria 7
UY - Uruguay 7
BO - Bolivia 6
LB - Libano 6
OM - Oman 6
SN - Senegal 6
DO - Repubblica Dominicana 5
KZ - Kazakistan 5
LK - Sri Lanka 5
TH - Thailandia 5
AL - Albania 4
BH - Bahrain 4
EE - Estonia 4
HR - Croazia 4
LV - Lettonia 4
PA - Panama 4
RS - Serbia 4
SK - Slovacchia (Repubblica Slovacca) 4
BG - Bulgaria 3
BN - Brunei Darussalam 3
CR - Costa Rica 3
QA - Qatar 3
BB - Barbados 2
ET - Etiopia 2
GE - Georgia 2
JM - Giamaica 2
KG - Kirghizistan 2
MD - Moldavia 2
RW - Ruanda 2
Totale 20.457
Città #
Chandler 1.310
Jacksonville 947
Singapore 943
Hong Kong 561
Dallas 552
Ashburn 537
Trento 518
Moscow 408
Beijing 294
The Dalles 287
Boardman 270
Wilmington 228
Los Angeles 204
Helsinki 196
Hefei 195
Dublin 185
New York 174
Kronberg 172
Dong Ket 151
Brooklyn 117
Ann Arbor 116
Dearborn 114
São Paulo 106
Munich 91
Ottawa 86
Phoenix 76
Brussels 70
Woodbridge 68
Milan 67
Santa Clara 66
Warsaw 64
Redwood City 59
Ho Chi Minh City 55
Shanghai 53
Montreal 52
Pune 51
Assago 50
Houston 50
Hanoi 49
Denver 48
Seattle 48
Verona 48
Campogalliano 47
Falkenstein 46
Tokyo 45
Atlanta 42
London 42
Mexico City 36
Secaucus 36
Rio de Janeiro 35
Poplar 33
Cheyenne 32
Rome 32
Stockholm 31
Belo Horizonte 30
Chicago 30
Miami 30
Chennai 29
Fremont 29
Johannesburg 29
Turku 29
Orem 28
Toronto 28
Hanover 25
Amsterdam 24
Curitiba 24
Frankfurt am Main 24
Ardabil 23
Brasília 23
Columbus 23
Porto Alegre 21
Sydney 21
Neumarkt 20
Mumbai 19
San Francisco 19
Manchester 18
Monmouth Junction 18
Mountain View 18
Nuremberg 18
Salvador 18
Tianjin 18
Boston 17
Shenzhen 17
Bologna 16
Charlotte 16
Guangzhou 16
Padova 16
Ribeirão Preto 16
Norwalk 15
Portland 15
Cambridge 14
Des Moines 14
Genoa 14
Istanbul 14
Lima 14
Nairobi 14
Tashkent 14
Berlin 13
Bolzano 13
Guarulhos 13
Totale 11.110
Nome #
A Wizard-based Approach for Secure Code Generation of Single Sign-On and Access Delegation Solutions for Mobile Native Apps 410
Multi-Stakeholder Cybersecurity Risk Assessment for Data Protection 375
The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis 253
Intelligent Systems and Formal Methods in Software Engineering 240
MQTTSA: A Tool for Automatically Assisting the Secure Deployments of MQTT Brokers 225
A First Appraisal of Cryptographic Mechanisms for the SelectiveDisclosure of Verifiable Credentials 220
Audit-Based Access Control with a Distributed Ledger: Applications to Healthcare Organizations 191
A Tool-assisted Methodology for the Data Protection Impact Assessment 189
A Risk-based Approach to Trustworthy AI Systems for Judicial Procedures 173
A delegated authorization solution for smart-city mobile applications 172
Lost in TLS? No More! Assisted Deployment of Secure TLS Configurations 171
Protecting Digital Identity Wallet: A Threat Model in the Age of eIDAS 2.0 171
PADS: Practical Attestation for Highly Dynamic Swarm Topologies 167
Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements 166
A First Appraisal of NIS2 and CRA Compliance Leveraging Open Source Tools 153
Learning from Others’ Mistakes: An Analysis of Cyber-security Incidents 153
A Lazy Approach to Access Control as a Service (ACaaS) for IoT 152
An Open and Flexible CyberSecurity Training Laboratory in IT/OT Infrastructures 152
Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration Endpoints 149
A Superposition Based Methodology to Design Satisfiability Decision Procedures 148
A Declarative Two-level Framework to Specify and Verify Workflow and Authorization Policies in Service Oriented Architectures 146
Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience 146
Validating Requirements of Access Control for Cloud-Edge IoT Solutions 143
Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications 143
Automated Assistance to the Security Assessment of API for Financial Services 141
A Declarative Framework for Specifying and Enforcing Purpose-Aware Policies 137
Secure Pull Printing with QR Codes and National eID Cards: A Software-oriented Design and an Open-source Implementation 137
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments 137
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 136
Attribute Based Access Control for APIs in Spring Security 136
Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications 136
A Methodology to build run-time Monitors for Security-Aware Workflows 135
A Combination of Rewriting and Constraint Solving for the Quantifier-free Interpolation of Arrays with Integer Difference Constraints 130
Best current practices for OAuth/OIDC Native Apps: A study of their adoption in popular providers and top-ranked Android clients 130
Automated and Secure Integration of the OpenID Connect iGov Profile in Mobile Native Applications 130
Assisted Authoring, Analysis and Enforcement of Access Control Policies in the Cloud 126
Attestation-enabled secure and scalable routing protocol for IoT networks 125
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 123
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 123
Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies 122
New results on rewrite-based satisfiability procedures 120
TLSAssistant Goes FINSEC - A Security Platform Integration Extending Threat Intelligence Language 120
A Theory of Singly-Linked Lists and its Extensible Decision Procedure 119
ASASP: Automated Symbolic Analysis of Security Policies 119
RDL---Rewrite and Decision procedure Laboratory 118
Efficient theory combination via boolean search 118
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 118
Efficient Theory Combination via Boolean Search 118
Safety-Related Cooperative, Connected, and Automated Mobility Services: Interplay Between Functional and Security Requirements 118
Abstraction-Driven Verification of Array Programs 116
SAFARI: SMT-Based Abstraction for Arrays with Interpolants 115
Scalable Automated Analysis of Access Control and Privacy Policies 115
Model checking: teoria ed applicazioni 115
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 114
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system 114
A Modular and Extensible Framework for Securing TLS 112
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 112
Parameterized model checking for security policy analysis 112
Automatically finding execution scenarios to deploy security-sensitive workflows 112
Automated and Efficient Analysis of Role-Based Access Control with Attributes 111
The Phase Transition of the Linear Inequalities Problem 110
Combination of convex theories: Modularity, deduction completeness, and explanation 110
Cerberus: Automated Synthesis of Enforcement Mechanisms for Security-Sensitive Business Processes 109
On Run-Time Enforcement of Authorization Constraints in Security-Sensitive Workflows 109
High Performance Deduction for verification: a case study in the theory of arrays 108
Efficient Satisfiability Modulo Theories via Delayed Theory Combination 107
ALPS: An Action Language for Policy Specification and Automated Safety Analysis 107
Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem 107
Automated Risk Assessment and What-if Analysis of OpenID Connect and OAuth 2.0 Deployments 107
The eIDAS Regulation: A Survey of Technological Trends for European Electronic Identity Schemes 106
Beyond Screens: Investigating Identity Proofing for the Metaverse Through Cross-Device Flows 106
Automated Analysis of Infinite State Workflows with Access Control Policies 106
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 106
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem 106
Backward Reachability of Array-based Systems by SMT solving: Termination and Invariant Synthesis 105
An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols 103
Quantifier-free interpolation in combinations of equality interpolating theories 102
Enroll, and Authentication Will Follow 102
SPLIT: A Secure and Scalable RPL routing protocol for Internet of Things 101
Automated Synthesis of Run-time Monitors to Enforce Authorization Policies in Business Processes 100
Modularity for Security-Sensitive Workflows 98
Uniform Derivation of Decision Procedures by Superposition 97
The {SMT-LIB} Initiative and the Rise of {SMT} - {(HVC} 2010 Award Talk) 97
Deciding Extensions of the Theory of Arrays by Integrating Decision Procedures and Instantiation Strategies 97
Analysis of XACML Policies with SMT 97
MCMT: A Model Checker Modulo Theories 96
Selective Release of Smart Metering Data in Multi-domain Smart Grids 96
Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment 96
Coommunication Protocols for Mathematical Services based on KQML and OMRS 95
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 95
Automated Legal Compliance Checking by Security Policy Analysis 95
Micro-Id-Gym: Identity Management Workouts with Container-Based Microservices 95
Formal Modelling and Automated Trade-off Analysis of Enforcement Architectures for Cryptographic Access Control in the Cloud 95
Brief Announcement: Automated Support for the Design and Validation of Fault Tolerant Parameterized Systems - A Case Study 94
DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections 94
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes 93
Assisting the Deployment of Security-Sensitive Workflows by Finding Execution Scenarios 93
Verification of Composed Array-based Systems with Applications to Security-Aware Workflows 93
Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS 92
Control is Nothing Without Trust a First Look into Digital Identity Wallet Trends 91
Totale 13.044
Categoria #
all - tutte 105.521
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 105.521


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.072 0 0 0 0 0 110 255 12 120 269 72 234
2021/20221.227 120 69 29 136 52 31 57 206 119 34 131 243
2022/20232.879 117 243 55 482 112 423 42 395 617 212 108 73
2023/20241.920 147 123 158 83 146 209 114 262 81 343 42 212
2024/20255.864 78 112 404 199 113 207 380 431 1.851 729 903 457
2025/20264.909 631 954 1.124 1.319 761 120 0 0 0 0 0 0
Totale 21.039