Armando, Alessandro
 Distribuzione geografica
Continente #
NA - Nord America 4.353
EU - Europa 3.291
AS - Asia 1.456
SA - Sud America 352
Continente sconosciuto - Info sul continente non disponibili 21
AF - Africa 15
OC - Oceania 6
Totale 9.494
Nazione #
US - Stati Uniti d'America 4.297
RU - Federazione Russa 1.024
DE - Germania 511
SG - Singapore 471
UA - Ucraina 426
SE - Svezia 415
BR - Brasile 323
CN - Cina 320
HK - Hong Kong 307
FI - Finlandia 238
IT - Italia 175
VN - Vietnam 128
NL - Olanda 127
GB - Regno Unito 126
IE - Irlanda 116
IN - India 72
KR - Corea 64
FR - Francia 55
CA - Canada 47
BE - Belgio 38
IR - Iran 22
EU - Europa 20
ES - Italia 9
AR - Argentina 8
TR - Turchia 8
JP - Giappone 7
PK - Pakistan 7
UZ - Uzbekistan 7
AZ - Azerbaigian 6
EC - Ecuador 6
AU - Australia 5
BD - Bangladesh 5
ID - Indonesia 5
IQ - Iraq 5
LT - Lituania 5
MX - Messico 5
IL - Israele 4
KG - Kirghizistan 4
MA - Marocco 4
RO - Romania 4
ZA - Sudafrica 4
AE - Emirati Arabi Uniti 3
AT - Austria 3
BO - Bolivia 3
CL - Cile 3
KZ - Kazakistan 3
PL - Polonia 3
RS - Serbia 3
TN - Tunisia 3
VE - Venezuela 3
CO - Colombia 2
DO - Repubblica Dominicana 2
LB - Libano 2
PH - Filippine 2
PT - Portogallo 2
PY - Paraguay 2
UY - Uruguay 2
A1 - Anonimo 1
AL - Albania 1
CG - Congo 1
CZ - Repubblica Ceca 1
DK - Danimarca 1
DZ - Algeria 1
EG - Egitto 1
GI - Gibilterra 1
HN - Honduras 1
HR - Croazia 1
HU - Ungheria 1
IS - Islanda 1
KE - Kenya 1
LU - Lussemburgo 1
LV - Lettonia 1
MD - Moldavia 1
MN - Mongolia 1
NZ - Nuova Zelanda 1
OM - Oman 1
PA - Panama 1
QA - Qatar 1
SA - Arabia Saudita 1
SK - Slovacchia (Repubblica Slovacca) 1
Totale 9.494
Città #
Jacksonville 908
Chandler 906
Hong Kong 303
Moscow 263
Singapore 247
Ashburn 220
Wilmington 219
Hefei 132
Dong Ket 127
Kronberg 125
Boardman 124
Ann Arbor 118
Dearborn 116
Dublin 114
Helsinki 112
The Dalles 107
Woodbridge 99
Trento 79
Beijing 67
Seattle 58
Houston 56
Brooklyn 50
Hangzhou 48
New York 44
Phoenix 42
Brussels 38
Los Angeles 38
Pune 32
Shanghai 32
Toronto 23
Miami 19
Milan 18
Ottawa 17
São Paulo 17
Norwalk 16
Falkenstein 14
Ardabil 13
Augusta 12
London 12
Rio de Janeiro 12
Monmouth Junction 11
Portland 11
Santa Clara 11
Cheyenne 10
Verona 10
Fremont 9
Leawood 9
Redwood City 9
San Mateo 9
Hanover 8
Belo Horizonte 7
Campogalliano 7
Redmond 7
Saint Petersburg 7
Tashkent 7
Auburn Hills 6
Baku 6
Costa Mesa 6
Falls Church 6
Mountain View 6
Munich 6
Tokyo 6
Chicago 5
Mumbai 5
Nanjing 5
Secaucus 5
Bishkek 4
Charlotte 4
Curitiba 4
Irving 4
Quito 4
Salvador 4
San Francisco 4
San Jose 4
Tehran 4
Volta Redonda 4
Ankara 3
Betim 3
Boston 3
Campo Grande 3
Campos dos Goytacazes 3
Caxias do Sul 3
Dhaka 3
Goiânia 3
Guangzhou 3
Jacareí 3
Juiz de Fora 3
Kunming 3
La Paz 3
Londrina 3
Marseille 3
Merano 3
Montreal 3
Neumarkt 3
Nuremberg 3
Recife 3
Ribeirão Preto 3
Senigallia 3
Stockholm 3
São Bernardo do Campo 3
Totale 5.303
Nome #
Dynamic analysis security testing of multi-party web applications via attack patterns 197
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications 193
Proceedings of the 4th International Joint Conference on Automated Reasoning, IJCAR 2008, Sydney 127
A Superposition Based Methodology to Design Satisfiability Decision Procedures 106
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 106
Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm 105
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries 104
MRG: Building planners for real world complex applications 103
MRG: un nucleo di ragionamento per un sistema integrato multifunzionale 102
New results on rewrite-based satisfiability procedures 102
Preface. Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning (PDPAR 2005) 100
Attribute Based Access Control for APIs in Spring Security 100
RDL---Rewrite and Decision procedure Laboratory 98
SATMC: a SAT-based Model Checker for Security-critical Systems 98
The Phase Transition of the Linear Inequalities Problem 97
Automatic Security Analysis of SAML-based Single Sign-On Protocols 97
Abstraction refinement of Linear Programs with Arrays 96
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 95
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 95
High Performance Deduction for verification: a case study in the theory of arrays 92
Automated and Efficient Analysis of Role-Based Access Control with Attributes 90
A knowledge based system for automatic 3D scene generation 90
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 89
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 88
Structured Proof Procedures 87
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints 87
ASASP: Automated Symbolic Analysis of Security Policies 87
An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations 86
Abstraction-driven SAT-based Analysis of Security Protocols 86
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 85
LTL Model Checking for Security Protocols 85
Coommunication Protocols for Mathematical Services based on KQML and OMRS 84
From Model-checking to Automated Testing of Security Protocols: Bridging the Gap 84
LTL Model Checking for Security Protocols 83
An Empirical Evaluation of the Android Security Framework 82
Un nucleo di ragionamento per un sistema integrato multi-funzionale: stato di avanzamento 82
Android Permissions Unleashed 82
Embedding complex decision procedures inside an interactive theorem prover 81
Navigation by Combining Reactivity and Planning 81
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols 81
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 81
The Control Component of Open Mechanized Reasoning Systems: Annotation and Tactics 80
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs 80
Visual Representation of Natural Language Scene Descriptions 79
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis 79
An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints 79
Bring Your Own Device, Securely 79
SAT-Based Decision Procedures for Automated Reasoning: a Unifying Perspective 78
The Control Component of Open Mechanized Reasoning Systems 78
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 78
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform 78
Flexible Planning by Integrating Multilevel Reasoning 78
Building SMT-based Software Model Checkers: an Experience Report 77
The Rewriting Approach to Satisfiability Procedures 77
Android vs. SEAndroid: An empirical assessment 77
Automatic Compilation of Protocol Insecurity Problems into Logic Programming. 76
From Propositional Deciders to First Order Deciders: a Structured Approach to the Decision Problem 76
Special Issue on Integrated Symbolic Computation and Automated Deduction of the Journal of Symbolic Computation 75
Automated Analysis of Infinite State Workflows with Access Control Policies 75
Counterexample-guided abstraction refinement for linear programs with arrays 75
SAT-Based Decision Procedures for Automated Reasoning: a unifying Perspective 74
Special Issue of the Journal of Automated Reasoning on "Automated Reasoning for Security Protocol Analysis" 74
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning 74
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: an Action-based Approach 74
Termination of Constraint Contextual Rewriting 74
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 73
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 73
Content- based information protection and release in NATO operations 72
On the Automated Analysis of Safety in Usage Control: A New Decidability Result 71
Selective Release of Smart Metering Data in Multi-domain Smart Grids 71
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations 71
SAT-based Model Checking for Security Protocols Analysis 71
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols 70
Minimum Disclosure as Boolean Optimization: New Results 70
Formal Analysis of a Privacy-Preserving Billing Protocol 70
Uniform Derivation of Decision Procedures by Superposition 69
Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. 68
Boosting Model Checking to Analyse Large ARBAC Policies 68
Trustworthy Opportunistic Access to the Internet of Services 68
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy 68
Special Issue on "CALCULEMUS: Systems for Integrated Computation and Deduction" 67
Formal Modeling and Reasoning about the Android Security Framework 67
SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies 67
First steps towards provably correct system synthesis of system code 66
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 66
From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? 66
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control 66
The Control Component of Open Mechanized Reasoning Systems 65
A Reconstruction and Extension of Maple's Assume Facility via Constraint Contextual Rewriting. 65
Bounded Model Checking of Software Using SMT Solvers Instead of SAT Solvers 65
Compiling NATO authorization policies for enforcement in the cloud and SDNs 65
Model Checking of Security-sensitive Business Processes 64
Automatic SAT-compilation of Protocol Insecurity Problems via Reduction to Planning 64
Formal Modeling and Verification of the Android Security Framework 64
Would You Mind Forking This Process? A Denial of Service attack on Android (and Some Countermeasures) 64
The AVISS Security Protocol Analysis Tool 64
Special Issue of the Journal of Automated Reasoning on Selected Papers from the 4th International Joint Conference of Automated Reasoning (IJCAR 2008) 62
Automated Symbolic Analysis of ARBAC Policies 62
Software Model Checking using Linear Constraints 62
Model-Checking Driven Security Testing of Web-Based Applications 61
Totale 8.183
Categoria #
all - tutte 57.157
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 57.157


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202080 0 0 0 0 0 0 0 0 0 0 0 80
2020/20211.282 182 2 132 74 130 40 191 4 11 246 72 198
2021/2022531 24 40 6 82 29 11 12 118 52 6 47 104
2022/20231.765 46 125 47 286 108 298 13 153 469 136 55 29
2023/2024891 86 37 94 45 66 94 76 171 29 112 8 73
2024/20252.877 23 25 324 83 29 31 167 173 1.101 392 438 91
Totale 9.632