Armando, Alessandro
 Distribuzione geografica
Continente #
NA - Nord America 4.031
EU - Europa 2.125
AS - Asia 933
Continente sconosciuto - Info sul continente non disponibili 21
OC - Oceania 6
SA - Sud America 5
AF - Africa 2
Totale 7.123
Nazione #
US - Stati Uniti d'America 3.988
DE - Germania 475
UA - Ucraina 424
SE - Svezia 413
HK - Hong Kong 269
FI - Finlandia 234
CN - Cina 190
IT - Italia 164
SG - Singapore 163
VN - Vietnam 128
GB - Regno Unito 120
IE - Irlanda 116
IN - India 70
KR - Corea 64
FR - Francia 55
RU - Federazione Russa 52
CA - Canada 40
BE - Belgio 36
EU - Europa 20
IR - Iran 19
NL - Olanda 8
AU - Australia 5
JP - Giappone 5
PK - Pakistan 5
AZ - Azerbaigian 4
ES - Italia 4
ID - Indonesia 4
KG - Kirghizistan 4
LT - Lituania 4
AT - Austria 3
BO - Bolivia 3
IL - Israele 3
PL - Polonia 3
RO - Romania 3
LB - Libano 2
MA - Marocco 2
MX - Messico 2
PT - Portogallo 2
RS - Serbia 2
TR - Turchia 2
A1 - Anonimo 1
BR - Brasile 1
CL - Cile 1
DK - Danimarca 1
HR - Croazia 1
HU - Ungheria 1
LU - Lussemburgo 1
LV - Lettonia 1
MD - Moldavia 1
NZ - Nuova Zelanda 1
PA - Panama 1
PH - Filippine 1
SK - Slovacchia (Repubblica Slovacca) 1
Totale 7.123
Città #
Jacksonville 908
Chandler 906
Hong Kong 266
Wilmington 219
Ashburn 218
Dong Ket 127
Kronberg 125
Boardman 124
Singapore 119
Ann Arbor 118
Dearborn 116
Dublin 114
Helsinki 109
Woodbridge 99
Trento 79
Beijing 66
Houston 56
Seattle 55
Hangzhou 48
Brooklyn 41
New York 40
Phoenix 39
Brussels 36
Los Angeles 32
Pune 32
Shanghai 30
Toronto 20
Miami 18
Ottawa 17
Norwalk 16
Milan 14
Ardabil 13
Augusta 12
Monmouth Junction 11
Portland 11
Cheyenne 10
Verona 10
Fremont 9
Leawood 9
Redwood City 9
San Mateo 9
Hanover 8
Campogalliano 7
London 7
Redmond 7
Saint Petersburg 7
Auburn Hills 6
Costa Mesa 6
Falls Church 6
Mountain View 6
Hefei 5
Mumbai 5
Nanjing 5
Santa Clara 5
Baku 4
Bishkek 4
Irving 4
Tehran 4
Tokyo 4
Falkenstein 3
Guangzhou 3
Kunming 3
La Paz 3
Marseille 3
Merano 3
Munich 3
Neumarkt 3
Secaucus 3
Senigallia 3
Warsaw 3
Berlin 2
Bolzano 2
Cologne 2
Daly City 2
Des Moines 2
Gunzenhausen 2
Görwihl 2
Howes Cave 2
Kolkata 2
Mexico City 2
North Bergen 2
Nuremberg 2
San Jose 2
Tappahannock 2
Vienna 2
Wanchai 2
Wuhan 2
Albenga 1
Amsterdam 1
Ankara 1
Atlanta 1
Auckland 1
Barcelona 1
Belgirate 1
Belgrade 1
Blaine 1
Bonn 1
Bournemouth 1
Bratislava 1
Brecon 1
Totale 4.490
Nome #
Dynamic analysis security testing of multi-party web applications via attack patterns 171
Attack Patterns for Black-Box Security Testing of Multi-Party Web Applications 159
Proceedings of the 4th International Joint Conference on Automated Reasoning, IJCAR 2008, Sydney 103
Automatic Synthesis of Recursive Programs: the Proof-Planning Paradigm 90
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution 89
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries 87
New results on rewrite-based satisfiability procedures 82
A Superposition Based Methodology to Design Satisfiability Decision Procedures 81
MRG: Building planners for real world complex applications 79
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security 79
Preface. Proceedings of the Third Workshop on Pragmatics of Decision Procedures in Automated Reasoning (PDPAR 2005) 79
Automatic Security Analysis of SAML-based Single Sign-On Protocols 77
SATMC: a SAT-based Model Checker for Security-critical Systems 77
RDL---Rewrite and Decision procedure Laboratory 76
MRG: un nucleo di ragionamento per un sistema integrato multifunzionale 76
The Phase Transition of the Linear Inequalities Problem 75
Abstraction refinement of Linear Programs with Arrays 75
Attribute Based Access Control for APIs in Spring Security 75
Structured Proof Procedures 72
High Performance Deduction for verification: a case study in the theory of arrays 72
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 69
Coommunication Protocols for Mathematical Services based on KQML and OMRS 69
Automated Analysis of Semantic-Aware Access Control Policies: a Logic-based Approach 69
ASASP: Automated Symbolic Analysis of Security Policies 68
A knowledge based system for automatic 3D scene generation 68
Abstraction-driven SAT-based Analysis of Security Protocols 68
A Practical Extension Mechanism for Decision Procedures: the Case Study of Universal Presburger Arithmetic 67
LTL Model Checking for Security Protocols 67
Embedding complex decision procedures inside an interactive theorem prover 66
A SAT-based Decision Procedure for the Boolean Combination of Difference Constraints 66
From Model-checking to Automated Testing of Security Protocols: Bridging the Gap 66
Automated and Efficient Analysis of Role-Based Access Control with Attributes 66
Navigation by Combining Reactivity and Planning 65
An Authentication Flaw in Browser-based Single Sign-On Protocols: Impact and Remediations 65
Bring Your Own Device, Securely 65
An Empirical Evaluation of the Android Security Framework 64
Visual Representation of Natural Language Scene Descriptions 63
Un nucleo di ragionamento per un sistema integrato multi-funzionale: stato di avanzamento 63
SATMC: a SAT-based model checker for security protocols, business processes, and security APIs 63
The Rewriting Approach to Satisfiability Procedures 61
Special Issue on Integrated Symbolic Computation and Automated Deduction of the Journal of Symbolic Computation 60
The Control Component of Open Mechanized Reasoning Systems: Annotation and Tactics 60
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis 60
Counterexample-guided abstraction refinement for linear programs with arrays 60
Flexible Planning by Integrating Multilevel Reasoning 60
A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies 60
LTL Model Checking for Security Protocols 59
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: an Action-based Approach 59
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module 59
Building SMT-based Software Model Checkers: an Experience Report 58
From Propositional Deciders to First Order Deciders: a Structured Approach to the Decision Problem 58
The Control Component of Open Mechanized Reasoning Systems 58
Rewrite and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation 58
An Action-based Approach to the Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints 58
Automated Analysis of Infinite State Workflows with Access Control Policies 57
Formal Modeling and Automatic Security Analysis of Two-Factor and Two-Channel Authentication Protocols 57
Automatic Compilation of Protocol Insecurity Problems into Logic Programming. 56
SAT-Based Decision Procedures for Automated Reasoning: a Unifying Perspective 56
Content- based information protection and release in NATO operations 56
Android vs. SEAndroid: An empirical assessment 56
Proceedings of the First Italian Conference on Cybersecurity (ITASEC17), Venice, Italy 56
Special Issue of the Journal of Automated Reasoning on "Automated Reasoning for Security Protocol Analysis" 55
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning 55
Android Permissions Unleashed 55
The Control Component of Open Mechanized Reasoning Systems 54
On a rewriting approach to satisfiability procedures: extension, combination of theories and an experimental appraisal 54
Efficient Symbolic Automated Analysis of Administrative Attribute-based RBAC-Policies 53
Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving 53
SAT-Based Decision Procedures for Automated Reasoning: a unifying Perspective 52
Uniform Derivation of Decision Procedures by Superposition 52
On the Automated Analysis of Safety in Usage Control: A New Decidability Result 52
Boosting Model Checking to Analyse Large ARBAC Policies 52
Selective Release of Smart Metering Data in Multi-domain Smart Grids 52
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform 52
First steps towards provably correct system synthesis of system code 51
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols 51
Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations 51
A Reconstruction and Extension of Maple's Assume Facility via Constraint Contextual Rewriting. 50
Special Issue on "CALCULEMUS: Systems for Integrated Computation and Deduction" 50
From Multiple Credentials to Browser-based Single Sign-On: Are We More Secure? 50
Formal Modeling and Reasoning about the Android Security Framework 50
Formal Analysis of a Privacy-Preserving Billing Protocol 50
SMT-based Enforcement and Analysis of NATO Content-based Protection and Release Policies 50
Bounded Model Checking of Software Using SMT Solvers Instead of SAT Solvers 49
Minimum Disclosure as Boolean Optimization: New Results 49
SAT-based Model Checking for Security Protocols Analysis 49
Model Checking of Security-sensitive Business Processes 48
Automated Symbolic Analysis of ARBAC Policies 48
Post-workshop Proceedings of the 1st Workshop on Automated Reasoning for Security Protocol Analysis 48
Special Issue of the Journal of Automated Reasoning on Selected Papers from the 4th International Joint Conference of Automated Reasoning (IJCAR 2008) 47
Symbolic Model-Checking of Linear Programs 47
Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps. 46
Automatic SAT-compilation of Protocol Insecurity Problems via Reduction to Planning 46
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control 46
Trustworthy Opportunistic Access to the Internet of Services 46
Formal Modeling and Verification of the Android Security Framework 45
Formal modeling and automatic enforcement of Bring Your Own Device policies 45
Software Model Checking using Linear Constraints 45
Bounded model checking of software using SMT solvers instead of SAT solvers 44
Would You Mind Forking This Process? A Denial of Service attack on Android (and Some Countermeasures) 44
Totale 6.249
Categoria #
all - tutte 46.865
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 46.865


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020714 0 0 0 0 0 90 164 18 156 47 159 80
2020/20211.282 182 2 132 74 130 40 191 4 11 246 72 198
2021/2022531 24 40 6 82 29 11 12 118 52 6 47 104
2022/20231.765 46 125 47 286 108 298 13 153 469 136 55 29
2023/2024891 86 37 94 45 66 94 76 171 29 112 8 73
2024/2025506 23 25 324 83 29 22 0 0 0 0 0 0
Totale 7.261