DALLA PREDA, Mila
 Distribuzione geografica
Continente #
EU - Europa 2.979
NA - Nord America 2.258
AS - Asia 1.852
SA - Sud America 172
AF - Africa 33
OC - Oceania 3
Continente sconosciuto - Info sul continente non disponibili 1
Totale 7.298
Nazione #
US - Stati Uniti d'America 2.215
RU - Federazione Russa 984
CN - Cina 625
GB - Regno Unito 613
SG - Singapore 597
IT - Italia 517
VN - Vietnam 203
HK - Hong Kong 193
FR - Francia 172
DE - Germania 144
FI - Finlandia 134
BR - Brasile 133
SE - Svezia 127
IE - Irlanda 121
ID - Indonesia 52
KR - Corea 46
JP - Giappone 41
BE - Belgio 38
CA - Canada 29
UA - Ucraina 28
IN - India 27
AT - Austria 18
NL - Olanda 14
BD - Bangladesh 13
ES - Italia 12
PL - Polonia 10
AR - Argentina 9
LT - Lituania 9
RO - Romania 9
EC - Ecuador 8
GR - Grecia 8
ZA - Sudafrica 8
MX - Messico 6
TG - Togo 6
CH - Svizzera 5
CL - Cile 5
CO - Colombia 5
EG - Egitto 5
MY - Malesia 5
SA - Arabia Saudita 5
TR - Turchia 5
AE - Emirati Arabi Uniti 4
PK - Pakistan 4
TH - Thailandia 4
VE - Venezuela 4
AL - Albania 3
IQ - Iraq 3
IR - Iran 3
KE - Kenya 3
MA - Marocco 3
PR - Porto Rico 3
AU - Australia 2
AZ - Azerbaigian 2
BJ - Benin 2
BO - Bolivia 2
GE - Georgia 2
IL - Israele 2
JM - Giamaica 2
JO - Giordania 2
NO - Norvegia 2
NP - Nepal 2
OM - Oman 2
PE - Perù 2
PH - Filippine 2
PT - Portogallo 2
PY - Paraguay 2
RS - Serbia 2
TN - Tunisia 2
TW - Taiwan 2
UY - Uruguay 2
UZ - Uzbekistan 2
BG - Bulgaria 1
CR - Costa Rica 1
CZ - Repubblica Ceca 1
DO - Repubblica Dominicana 1
EE - Estonia 1
EU - Europa 1
GH - Ghana 1
HR - Croazia 1
HU - Ungheria 1
KH - Cambogia 1
LK - Sri Lanka 1
MD - Moldavia 1
MM - Myanmar 1
MR - Mauritania 1
NA - Namibia 1
NG - Nigeria 1
PA - Panama 1
PS - Palestinian Territory 1
SK - Slovacchia (Repubblica Slovacca) 1
TO - Tonga 1
Totale 7.298
Città #
Southend 487
Chandler 314
Moscow 300
Singapore 256
Woodbridge 222
Jacksonville 200
Hong Kong 184
Dallas 183
Verona 151
Ashburn 147
Ann Arbor 137
Dublin 117
Beijing 100
Dong Ket 92
Houston 91
Helsinki 58
Milan 58
Wilmington 56
Lawrence 54
Princeton 54
The Dalles 51
Jinan 50
Jakarta 46
Nanjing 41
Shenyang 41
Bari 39
Los Angeles 35
Council Bluffs 29
Ho Chi Minh City 29
Changsha 27
Buffalo 26
Redondo Beach 26
New York 22
Brussels 21
Ningbo 21
Seattle 21
Tokyo 21
Hanoi 19
Columbus 17
Sindelfingen 17
Taizhou 17
Hebei 16
Tianjin 16
Zhengzhou 16
Hangzhou 15
London 15
Boardman 14
Haikou 14
Jiaxing 13
Munich 13
Vicenza 13
São Paulo 12
Frankfurt am Main 11
Rome 11
Trieste 11
Vienna 11
Catanzaro 10
Chicago 10
Falkenstein 10
Nanchang 10
Ottawa 10
Redwood City 10
Santa Clara 10
Toronto 10
Gent 9
Seoul 9
Guangzhou 8
Nuremberg 8
Osaka 8
Warsaw 8
Des Moines 7
Dhaka 7
Lappeenranta 7
Rio de Janeiro 7
San Francisco 7
Bergamo 6
Bologna 6
Brooklyn 6
Cagliari 6
Hilliard 6
Lomé 6
Amsterdam 5
Boston 5
Johannesburg 5
Kowloon Tong 5
Kuala Lumpur 5
Lanzhou 5
Shanghai 5
Treviso 5
Turin 5
Athens 4
Auburn Hills 4
Berlin 4
Buttapietra 4
Cairo 4
Cevo 4
Charlotte 4
Dayton 4
Fairfield 4
Fuzhou 4
Totale 4.364
Nome #
Code obfuscation and malware detection by abstract interpretation 333
A semantics-based approach to software watermarking by abstract interpretation 245
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 186
Chasing infections by unveiling program dependencies. 184
SEA: String Executability Analysis by Abstract Interpretation 175
Active Android malware analysis: an approach based on stochastic games 172
Control code obfuscation by abstract interpretation 168
Data augmentation and transfer learning to classify malware images in a deep learning context 160
A deep learning approach to program similarity. 159
Completeness Refinement in Abstract Symbolic Trajectory Evaluation 155
Analyzing program dependences for malware detection. 151
Barrier Slicing for Remote Software Trusting 146
Infections as Abstract Symbolic Finite Automata: Formal Model and Applications. 146
Characterizing A Property-Driven Obfuscation Strategy 144
Fast location of similar code fragments using semantic 'juice' 131
EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode 130
Abstract Interpretation of Indexed Grammars. 128
A Semantics-Based Approach to Malware Detection 126
Dynamic Choreographies Safe Runtime Updates of Distributed Applications. 125
Completeness in Approximate Transduction 125
Remote software protection by orthogonal client replacement 124
Formal Framework for Property-driven Obfuscations 124
Developing correct, distributed, adaptive software 124
Software Watermarking: A Semantics-based Approach 124
Revealing Similarities in Android Malware by Dissecting their Methods 122
Twisting Additivity in Program Obfuscation 120
A Semantics-Based Approach to Malware Detection 118
DYNAMIC CHOREOGRAPHIES: THEORY AND IMPLEMENTATION 118
Abstract Similarity Analysis 117
Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode 117
Maximal incompleteness as obfuscation potency 115
Partial (In)Completeness in Abstract Interpretation: Limiting the Imprecision in Program Analysis 114
Semantic-based code obfuscation by abstract interpretation 112
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology 112
AIOCJ: A Choreographic Framework for Safe Adaptive Distributed Applications. 112
Hunting Distributed Malware with the k-Calculus 111
Formal framework for reasoning about the precision of dynamic analysis 111
Unveiling metamorphism by abstract interpretation of code properties 110
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 109
Adversarial Authorship Attribution in Open-Source Projects 108
The Grand Challenge in Metamorphic Analysis 106
Learning metamorphic malware signatures from samples 105
GroupDroid: Automatically Grouping Mobile Malware by Extracting Code Similarities 103
Modelling Metamorphism by Abstract Interpretation 101
Opaque Predicate Detection by Abstract Interpretation 100
Hunting obfuscated malware by abstract interpretation 100
Semantic-based Code Obfuscation by Abstract Interpretation 100
On-chip system call tracing: A feasibility study and open prototype 100
Graceful Interruption of Request-Response Service Interactions 98
Trading-off security and performance in barrier slicing for remote software entrusting 94
Semantics-based software watermarking by abstract interpretation 94
Hiding Software Watermarks in Loop Structures. 93
Towards Obfuscation of Programmable Logic Controllers 87
Interface-Based Service Composition with Aggregation 85
Service integration via target-transparent mediation 83
Obfuscation strategies for industrial control systems 78
Towards a Unifying Framework for Tuning Analysis Precision by Program Transformation 78
Monotonicity and the Precision of Program Analysis 77
On the Properties of Partial Completeness in Abstract Interpretation 67
Exploring NFT Validation through Digital Watermarking 59
Dataset Characteristics for Reliable Code Authorship Attribution 45
Totale 7.464
Categoria #
all - tutte 25.392
article - articoli 8.308
book - libri 0
conference - conferenze 15.165
curatela - curatele 0
other - altro 1.919
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 50.784


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021432 0 0 0 0 53 41 14 78 28 10 37 171
2021/2022353 17 54 11 21 19 8 9 32 22 16 40 104
2022/2023881 66 89 85 145 97 186 15 46 91 11 30 20
2023/2024645 32 36 39 67 64 61 26 60 30 72 124 34
2024/20251.304 62 91 47 252 47 61 57 126 142 100 124 195
2025/20261.959 289 196 239 490 745 0 0 0 0 0 0 0
Totale 7.464