Armando, Alessandro
 Distribuzione geografica
Continente #
NA - Nord America 5.038
EU - Europa 3.453
AS - Asia 2.375
SA - Sud America 728
AF - Africa 54
Continente sconosciuto - Info sul continente non disponibili 21
OC - Oceania 7
AN - Antartide 1
Totale 11.677
Nazione #
US - Stati Uniti d'America 4.933
RU - Federazione Russa 1.035
SG - Singapore 988
BR - Brasile 630
DE - Germania 532
CN - Cina 513
UA - Ucraina 434
SE - Svezia 423
HK - Hong Kong 332
FI - Finlandia 240
VN - Vietnam 190
IT - Italia 181
GB - Regno Unito 175
NL - Olanda 129
IE - Irlanda 117
IN - India 103
FR - Francia 73
CA - Canada 69
KR - Corea 64
BE - Belgio 38
AR - Argentina 33
ZA - Sudafrica 27
BD - Bangladesh 26
MX - Messico 26
PL - Polonia 23
IR - Iran 22
IQ - Iraq 21
EU - Europa 20
EC - Ecuador 18
ES - Italia 17
TR - Turchia 15
JP - Giappone 14
PK - Pakistan 13
VE - Venezuela 13
SA - Arabia Saudita 11
UZ - Uzbekistan 11
AE - Emirati Arabi Uniti 9
LT - Lituania 9
AZ - Azerbaigian 8
CL - Cile 8
CO - Colombia 8
ID - Indonesia 7
MA - Marocco 7
KE - Kenya 6
PY - Paraguay 6
AU - Australia 5
DO - Repubblica Dominicana 5
IL - Israele 5
RO - Romania 5
TN - Tunisia 5
UY - Uruguay 5
BO - Bolivia 4
KG - Kirghizistan 4
RS - Serbia 4
AT - Austria 3
DZ - Algeria 3
EG - Egitto 3
KZ - Kazakistan 3
LB - Libano 3
OM - Oman 3
NP - Nepal 2
PE - Perù 2
PH - Filippine 2
PT - Portogallo 2
A1 - Anonimo 1
AL - Albania 1
AO - Angola 1
AQ - Antartide 1
BA - Bosnia-Erzegovina 1
BY - Bielorussia 1
CG - Congo 1
CZ - Repubblica Ceca 1
DK - Danimarca 1
GI - Gibilterra 1
GY - Guiana 1
HN - Honduras 1
HR - Croazia 1
HU - Ungheria 1
IS - Islanda 1
JM - Giamaica 1
JO - Giordania 1
KI - Kiribati 1
KW - Kuwait 1
LU - Lussemburgo 1
LV - Lettonia 1
LY - Libia 1
MD - Moldavia 1
MN - Mongolia 1
MY - Malesia 1
NZ - Nuova Zelanda 1
PA - Panama 1
PR - Porto Rico 1
QA - Qatar 1
SK - Slovacchia (Repubblica Slovacca) 1
TJ - Tagikistan 1
TT - Trinidad e Tobago 1
Totale 11.677
Città #
Jacksonville 908
Chandler 906
Singapore 629
Ashburn 338
Hong Kong 328
Moscow 263
Wilmington 219
Dallas 203
Beijing 198
Hefei 132
Dong Ket 127
Kronberg 125
Boardman 124
The Dalles 123
Ann Arbor 118
Dearborn 116
Dublin 115
Helsinki 112
Woodbridge 100
Trento 79
New York 68
Los Angeles 64
Seattle 61
Houston 60
Brooklyn 59
Hangzhou 48
Phoenix 48
São Paulo 44
Brussels 38
Pune 32
Shanghai 32
Ho Chi Minh City 31
Toronto 26
London 23
Santa Clara 21
Warsaw 21
Miami 20
Rio de Janeiro 20
Milan 18
Ottawa 17
Belo Horizonte 16
Norwalk 16
Johannesburg 15
Munich 15
Denver 14
Falkenstein 14
Hanoi 14
Ardabil 13
Charlotte 13
Tokyo 13
Augusta 12
Chicago 12
Montreal 12
Orem 12
Brasília 11
Monmouth Junction 11
Portland 11
Atlanta 10
Chennai 10
Cheyenne 10
Tashkent 10
Verona 10
Boston 9
Curitiba 9
Fremont 9
Leawood 9
Mexico City 9
Mumbai 9
Redwood City 9
San Mateo 9
Stockholm 9
Ankara 8
Baku 8
Hanover 8
Juiz de Fora 8
Manchester 8
Poplar 8
Salvador 8
Baghdad 7
Campogalliano 7
Council Bluffs 7
Quito 7
Redmond 7
Saint Petersburg 7
Secaucus 7
Tianjin 7
Auburn Hills 6
Campinas 6
Cape Town 6
Costa Mesa 6
Falls Church 6
Frankfurt am Main 6
Goiânia 6
Jeddah 6
Mountain View 6
Nairobi 6
Ribeirão Preto 6
San Francisco 6
Belford Roxo 5
Buenos Aires 5
Totale 6.563
Nome #
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications 219
Dynamic analysis security testing of multi-party web applications via attack patterns 214
A Superposition Based Methodology to Design Satisfiability Decision Procedures 148
Proceedings of the 4th International Joint Conference on Automated Reasoning, IJCAR 2008, Sydney 141
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 136
Attribute Based Access Control for APIs in Spring Security 136
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries 133
Automatic Security Analysis of SAML-based Single Sign-On Protocols 125
SATMC: a SAT-based Model Checker for Security-critical Systems 124
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 123
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 123
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints 122
A knowledge based system for automatic 3D scene generation 122
New results on rewrite-based satisfiability procedures 120
Abstraction refinement of Linear Programs with Arrays 119
ASASP: Automated Symbolic Analysis of Security Policies 119
RDL---Rewrite and Decision procedure Laboratory 118
MRG: Building planners for real world complex applications 118
Abstraction-driven SAT-based Analysis of Security Protocols 117
MRG: un nucleo di ragionamento per un sistema integrato multifunzionale 114
Preface. Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning (PDPAR 2005) 114
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 114
An Empirical Evaluation of the Android Security Framework 113
Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm 112
An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints 112
Automated and Efficient Analysis of Role-Based Access Control with Attributes 111
The Phase Transition of the Linear Inequalities Problem 110
An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations 109
High Performance Deduction for verification: a case study in the theory of arrays 108
Android Permissions Unleashed 108
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 107
Automated Analysis of Infinite State Workflows with Access Control Policies 106
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 106
Android vs. SEAndroid: An empirical assessment 106
Structured Proof Procedures 102
From Model-checking to Automated Testing of Security Protocols: Bridging the Gap 102
A Reconstruction and Extension of Maple's Assume Facility via Constraint Contextual Rewriting. 101
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols 100
Navigation by Combining Reactivity and Planning 99
LTL Model Checking for Security Protocols 99
Flexible Planning by Integrating Multilevel Reasoning 99
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols 98
Risk-Based Privacy-Aware Information Disclosure 98
SAT-Based Decision Procedures for Automated Reasoning: a Unifying Perspective 97
Uniform Derivation of Decision Procedures by Superposition 97
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform 97
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 96
Visual Representation of Natural Language Scene Descriptions 96
Selective Release of Smart Metering Data in Multi-domain Smart Grids 96
Counterexample-guided abstraction refinement for linear programs with arrays 96
Coommunication Protocols for Mathematical Services based on KQML and OMRS 95
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 95
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis 95
LTL Model Checking for Security Protocols 95
Special Issue of the Journal of Automated Reasoning on "Automated Reasoning for Security Protocol Analysis" 94
Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. 94
Un nucleo di ragionamento per un sistema integrato multi-funzionale: stato di avanzamento 93
Embedding complex decision procedures inside an interactive theorem prover 92
The Control Component of Open Mechanized Reasoning Systems 92
Building SMT-based Software Model Checkers: an Experience Report 91
From Propositional Deciders to First Order Deciders: a Structured Approach to the Decision Problem 91
The Rewriting Approach to Satisfiability Procedures 91
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs 91
Content- based information protection and release in NATO operations 89
The Control Component of Open Mechanized Reasoning Systems: Annotation and Tactics 88
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 88
Bounded Model Checking of Software Using SMT Solvers Instead of SAT Solvers 88
Automatic Compilation of Protocol Insecurity Problems into Logic Programming. 87
SAT-Based Decision Procedures for Automated Reasoning: a unifying Perspective 87
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning 87
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: an Action-based Approach 87
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 86
Bring Your Own Device, Securely 86
Trustworthy Opportunistic Access to the Internet of Services 85
From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? 84
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations 84
Formal Analysis of a Privacy-Preserving Billing Protocol 84
Special Issue on Integrated Symbolic Computation and Automated Deduction of the Journal of Symbolic Computation 83
On the Automated Analysis of Safety in Usage Control: A New Decidability Result 83
Minimum Disclosure as Boolean Optimization: New Results 83
Compiling NATO authorization policies for enforcement in the cloud and SDNs 83
First steps towards provably correct system synthesis of system code 82
Special Issue of the Journal of Automated Reasoning on Selected Papers from the 4th International Joint Conference of Automated Reasoning (IJCAR 2008) 82
SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies 82
Termination of Constraint Contextual Rewriting 82
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy 81
Would You Mind Forking This Process? A Denial of Service attack on Android (and Some Countermeasures) 80
Boosting Model Checking to Analyse Large ARBAC Policies 79
Special Issue on "CALCULEMUS: Systems for Integrated Computation and Deduction" 78
Symbolic Model-Checking of Linear Programs 78
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control 78
SAT-based Model Checking for Security Protocols Analysis 78
The AVISS Security Protocol Analysis Tool 78
Model Checking of Security-sensitive Business Processes 77
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 77
Formal Modeling and Verification of the Android Security Framework 77
Formal Modeling and Reasoning about the Android Security Framework 77
Bounded model checking of software using SMT solvers instead of SAT solvers 76
The Control Component of Open Mechanized Reasoning Systems 76
Model checking authorization requirements in business processes 76
Totale 10.045
Categoria #
all - tutte 66.461
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 66.461


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021762 0 0 0 0 0 40 191 4 11 246 72 198
2021/2022531 24 40 6 82 29 11 12 118 52 6 47 104
2022/20231.765 46 125 47 286 108 298 13 153 469 136 55 29
2023/2024891 86 37 94 45 66 94 76 171 29 112 8 73
2024/20253.001 23 25 324 83 29 31 167 173 1.101 392 438 215
2025/20262.059 304 469 470 428 309 79 0 0 0 0 0 0
Totale 11.815