Armando, Alessandro
 Distribuzione geografica
Continente #
EU - Europa 6.411
NA - Nord America 6.112
AS - Asia 3.290
SA - Sud America 836
AF - Africa 78
Continente sconosciuto - Info sul continente non disponibili 21
OC - Oceania 8
AN - Antartide 1
Totale 16.757
Nazione #
US - Stati Uniti d'America 5.985
RU - Federazione Russa 3.710
SG - Singapore 1.321
BR - Brasile 703
DE - Germania 625
CN - Cina 618
VN - Vietnam 520
UA - Ucraina 438
SE - Svezia 434
HK - Hong Kong 369
FI - Finlandia 241
FR - Francia 198
GB - Regno Unito 185
IT - Italia 185
IN - India 134
NL - Olanda 133
IE - Irlanda 119
CA - Canada 75
KR - Corea 64
AR - Argentina 46
BD - Bangladesh 42
BE - Belgio 38
ZA - Sudafrica 38
IQ - Iraq 37
MX - Messico 37
PL - Polonia 35
IR - Iran 23
ES - Italia 21
JP - Giappone 21
EC - Ecuador 20
EU - Europa 20
TR - Turchia 19
VE - Venezuela 18
PK - Pakistan 17
SA - Arabia Saudita 14
UZ - Uzbekistan 14
AE - Emirati Arabi Uniti 12
CO - Colombia 12
LT - Lituania 12
PY - Paraguay 10
AZ - Azerbaigian 9
CL - Cile 9
ID - Indonesia 8
MA - Marocco 8
UY - Uruguay 8
KE - Kenya 7
RO - Romania 7
AU - Australia 6
IL - Israele 6
TN - Tunisia 6
BO - Bolivia 5
DO - Repubblica Dominicana 5
DZ - Algeria 5
JO - Giordania 5
KZ - Kazakistan 5
LB - Libano 5
MY - Malesia 5
NP - Nepal 5
PH - Filippine 5
PT - Portogallo 5
EG - Egitto 4
KG - Kirghizistan 4
RS - Serbia 4
AT - Austria 3
HU - Ungheria 3
OM - Oman 3
PA - Panama 3
PE - Perù 3
BY - Bielorussia 2
CG - Congo 2
CR - Costa Rica 2
CZ - Repubblica Ceca 2
ET - Etiopia 2
GY - Guiana 2
MD - Moldavia 2
A1 - Anonimo 1
AL - Albania 1
AO - Angola 1
AQ - Antartide 1
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
DK - Danimarca 1
GH - Ghana 1
GI - Gibilterra 1
GT - Guatemala 1
HN - Honduras 1
HR - Croazia 1
IS - Islanda 1
JM - Giamaica 1
KI - Kiribati 1
KW - Kuwait 1
LU - Lussemburgo 1
LV - Lettonia 1
LY - Libia 1
MN - Mongolia 1
MU - Mauritius 1
NZ - Nuova Zelanda 1
PR - Porto Rico 1
QA - Qatar 1
RE - Reunion 1
Totale 16.753
Città #
Jacksonville 908
Chandler 906
Singapore 716
San Jose 695
Ashburn 466
Hong Kong 357
Moscow 263
Wilmington 219
Beijing 211
Dallas 205
The Dalles 176
Hefei 132
Dong Ket 127
Ho Chi Minh City 126
Boardman 125
Kronberg 125
Ann Arbor 118
Dublin 117
Dearborn 116
Helsinki 113
Hanoi 108
Lauterbourg 108
Woodbridge 101
Los Angeles 80
Trento 79
New York 74
Seattle 62
Brooklyn 61
Houston 61
São Paulo 55
Phoenix 52
Hangzhou 50
Brussels 38
Shanghai 36
Santa Clara 34
Pune 32
Warsaw 32
Da Nang 28
Toronto 27
London 25
Rio de Janeiro 25
Frankfurt am Main 24
Orem 22
Miami 21
Hillsboro 20
Johannesburg 20
Tokyo 20
Chennai 19
Denver 18
Milan 18
Ottawa 17
Atlanta 16
Belo Horizonte 16
Norwalk 16
Chicago 15
Munich 15
Charlotte 14
Falkenstein 14
Haiphong 14
Montreal 14
Ardabil 13
Brasília 13
Tashkent 13
Augusta 12
Baghdad 12
Boston 12
Mumbai 12
Council Bluffs 11
Monmouth Junction 11
Portland 11
Cheyenne 10
Tianjin 10
Verona 10
Curitiba 9
Dhaka 9
Fremont 9
Leawood 9
Manchester 9
Mexico City 9
Nuremberg 9
Poplar 9
Redwood City 9
San Mateo 9
Stockholm 9
Ankara 8
Baku 8
Cape Town 8
Erbil 8
Hanover 8
Juiz de Fora 8
Salvador 8
Secaucus 8
Amsterdam 7
Campogalliano 7
Guarulhos 7
Jeddah 7
Montevideo 7
Nairobi 7
Quito 7
Redmond 7
Totale 8.091
Nome #
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications 278
Dynamic analysis security testing of multi-party web applications via attack patterns 259
A Superposition Based Methodology to Design Satisfiability Decision Procedures 208
Attribute Based Access Control for APIs in Spring Security 205
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 194
Automatic Security Analysis of SAML-based Single Sign-On Protocols 192
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries 183
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 180
Proceedings of the 4th International Joint Conference on Automated Reasoning, IJCAR 2008, Sydney 180
Abstraction-driven SAT-based Analysis of Security Protocols 180
New results on rewrite-based satisfiability procedures 179
Automated and Efficient Analysis of Role-Based Access Control with Attributes 177
A knowledge based system for automatic 3D scene generation 175
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 173
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints 168
ASASP: Automated Symbolic Analysis of Security Policies 168
SATMC: a SAT-based Model Checker for Security-critical Systems 168
MRG: Building planners for real world complex applications 164
An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations 164
Abstraction refinement of Linear Programs with Arrays 162
MRG: un nucleo di ragionamento per un sistema integrato multifunzionale 162
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 162
Android Permissions Unleashed 160
A Reconstruction and Extension of Maple's Assume Facility via Constraint Contextual Rewriting. 158
High Performance Deduction for verification: a case study in the theory of arrays 158
RDL---Rewrite and Decision procedure Laboratory 157
Preface. Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning (PDPAR 2005) 157
Android vs. SEAndroid: An empirical assessment 157
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 156
The Phase Transition of the Linear Inequalities Problem 155
Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm 154
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols 154
An Empirical Evaluation of the Android Security Framework 153
Automated Analysis of Infinite State Workflows with Access Control Policies 151
An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints 151
SAT-Based Decision Procedures for Automated Reasoning: a Unifying Perspective 149
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 146
From Model-checking to Automated Testing of Security Protocols: Bridging the Gap 145
Building SMT-based Software Model Checkers: an Experience Report 144
Selective Release of Smart Metering Data in Multi-domain Smart Grids 142
Uniform Derivation of Decision Procedures by Superposition 141
Bounded Model Checking of Software Using SMT Solvers Instead of SAT Solvers 141
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis 140
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: an Action-based Approach 137
Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. 136
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols 136
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform 136
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning 135
Visual Representation of Natural Language Scene Descriptions 134
Special Issue of the Journal of Automated Reasoning on "Automated Reasoning for Security Protocol Analysis" 134
Counterexample-guided abstraction refinement for linear programs with arrays 134
Flexible Planning by Integrating Multilevel Reasoning 134
Navigation by Combining Reactivity and Planning 133
Risk-Based Privacy-Aware Information Disclosure 133
Coommunication Protocols for Mathematical Services based on KQML and OMRS 132
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 132
Embedding complex decision procedures inside an interactive theorem prover 131
From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? 131
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 130
Structured Proof Procedures 130
LTL Model Checking for Security Protocols 130
LTL Model Checking for Security Protocols 129
Special Issue on "CALCULEMUS: Systems for Integrated Computation and Deduction" 128
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs 128
The Control Component of Open Mechanized Reasoning Systems: Annotation and Tactics 126
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 125
Content- based information protection and release in NATO operations 125
Un nucleo di ragionamento per un sistema integrato multi-funzionale: stato di avanzamento 125
Automatic Compilation of Protocol Insecurity Problems into Logic Programming. 124
From Propositional Deciders to First Order Deciders: a Structured Approach to the Decision Problem 124
Compiling NATO authorization policies for enforcement in the cloud and SDNs 124
SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies 124
Termination of Constraint Contextual Rewriting 124
The Control Component of Open Mechanized Reasoning Systems 123
The Rewriting Approach to Satisfiability Procedures 122
On the Automated Analysis of Safety in Usage Control: A New Decidability Result 121
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations 121
Formal Analysis of a Privacy-Preserving Billing Protocol 121
SAT-Based Decision Procedures for Automated Reasoning: a unifying Perspective 120
Boosting Model Checking to Analyse Large ARBAC Policies 120
Trustworthy Opportunistic Access to the Internet of Services 119
Model Checking of Security-sensitive Business Processes 118
Bring Your Own Device, Securely 118
Post-workshop Proceedings of the 1st Workshop on Automated Reasoning for Security Protocol Analysis 118
Special Issue on Integrated Symbolic Computation and Automated Deduction of the Journal of Symbolic Computation 117
Special Issue of the Journal of Automated Reasoning on Selected Papers from the 4th International Joint Conference of Automated Reasoning (IJCAR 2008) 117
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 117
Would You Mind Forking This Process? A Denial of Service attack on Android (and Some Countermeasures) 116
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control 116
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy 116
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 115
Post-workshop Proceedings of the 3rd Workshop on Pragmatics of Decision Procedures in Automated Reasoning 114
The AVISS Security Protocol Analysis Tool 113
Bounded model checking of software using SMT solvers instead of SAT solvers 112
Model checking authorization requirements in business processes 111
SAT-based Model Checking for Security Protocols Analysis 111
Minimum Disclosure as Boolean Optimization: New Results 110
Model-Checking Driven Security Testing of Web-Based Applications 109
Formal Modeling and Reasoning about the Android Security Framework 108
Special Issue on "Combining Logical Systems" of the Information and Computation journal 107
Totale 14.284
Categoria #
all - tutte 73.856
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 73.856


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021516 0 0 0 0 0 0 0 0 0 246 72 198
2021/2022531 24 40 6 82 29 11 12 118 52 6 47 104
2022/20231.765 46 125 47 286 108 298 13 153 469 136 55 29
2023/2024891 86 37 94 45 66 94 76 171 29 112 8 73
2024/20253.001 23 25 324 83 29 31 167 173 1.101 392 438 215
2025/20267.139 304 469 470 428 309 313 1.220 2.872 507 247 0 0
Totale 16.895