GIACOBAZZI, Roberto
 Distribuzione geografica
Continente #
NA - Nord America 6.076
EU - Europa 5.334
AS - Asia 4.187
SA - Sud America 416
AF - Africa 110
OC - Oceania 12
Continente sconosciuto - Info sul continente non disponibili 4
Totale 16.139
Nazione #
US - Stati Uniti d'America 5.883
SG - Singapore 1.770
RU - Federazione Russa 1.629
GB - Regno Unito 1.322
CN - Cina 1.231
IT - Italia 686
DE - Germania 402
HK - Hong Kong 386
FR - Francia 339
BR - Brasile 329
VN - Vietnam 293
FI - Finlandia 266
IE - Irlanda 232
SE - Svezia 224
CA - Canada 165
KR - Corea 136
JP - Giappone 76
UA - Ucraina 64
IN - India 49
ID - Indonesia 42
TR - Turchia 40
BD - Bangladesh 35
BE - Belgio 35
AT - Austria 26
AR - Argentina 22
IQ - Iraq 21
ZA - Sudafrica 21
NL - Olanda 19
PL - Polonia 18
VE - Venezuela 18
MA - Marocco 15
ES - Italia 13
SA - Arabia Saudita 13
TN - Tunisia 13
NG - Nigeria 12
CO - Colombia 11
IR - Iran 11
PK - Pakistan 10
UZ - Uzbekistan 10
AU - Australia 9
EG - Egitto 9
KE - Kenya 9
MX - Messico 9
NP - Nepal 9
CL - Cile 8
EC - Ecuador 8
GR - Grecia 8
PH - Filippine 8
BO - Bolivia 7
MY - Malesia 7
JO - Giordania 6
PY - Paraguay 6
SN - Senegal 6
TG - Togo 6
AL - Albania 5
DZ - Algeria 5
MK - Macedonia 5
AE - Emirati Arabi Uniti 4
CH - Svizzera 4
CR - Costa Rica 4
HR - Croazia 4
IL - Israele 4
KZ - Kazakistan 4
LT - Lituania 4
RO - Romania 4
UY - Uruguay 4
BG - Bulgaria 3
CZ - Repubblica Ceca 3
EE - Estonia 3
KH - Cambogia 3
PE - Perù 3
PT - Portogallo 3
QA - Qatar 3
TH - Thailandia 3
AI - Anguilla 2
AO - Angola 2
AZ - Azerbaigian 2
BJ - Benin 2
DO - Repubblica Dominicana 2
EU - Europa 2
GE - Georgia 2
HN - Honduras 2
HU - Ungheria 2
LU - Lussemburgo 2
MD - Moldavia 2
MU - Mauritius 2
OM - Oman 2
PA - Panama 2
PR - Porto Rico 2
SY - Repubblica araba siriana 2
XK - ???statistics.table.value.countryCode.XK??? 2
AM - Armenia 1
BA - Bosnia-Erzegovina 1
BW - Botswana 1
BY - Bielorussia 1
CD - Congo 1
CG - Congo 1
DK - Danimarca 1
GD - Grenada 1
GH - Ghana 1
Totale 16.120
Città #
Singapore 1.112
Southend 1.028
Ashburn 708
Chandler 621
Jacksonville 583
Moscow 495
San Jose 495
Woodbridge 455
Hong Kong 382
Dallas 380
Verona 299
Ann Arbor 288
Houston 280
Dublin 228
The Dalles 218
Beijing 161
Munich 157
Wilmington 115
Montréal 114
Mcallen 107
Lawrence 106
Princeton 106
Jinan 104
Nanjing 78
Milan 73
Los Angeles 71
Helsinki 69
Tokyo 69
Shenyang 63
Ho Chi Minh City 62
Dong Ket 61
Hanoi 59
Hebei 57
Changsha 56
New York 53
Boardman 50
Buffalo 48
Santa Clara 42
Columbus 40
Council Bluffs 40
Tianjin 40
Haikou 38
Sindelfingen 38
Guangzhou 35
Zhengzhou 34
Redondo Beach 33
São Paulo 30
Hangzhou 29
Jakarta 29
Seattle 28
Frankfurt am Main 27
Brussels 24
Rome 23
Nanchang 22
Paris 22
Jiaxing 21
Ningbo 20
Rio de Janeiro 20
Taizhou 20
London 18
Turku 17
Chicago 16
Seoul 16
Brooklyn 15
Vienna 15
Falkenstein 14
Johannesburg 14
Lanzhou 14
Ottawa 14
Taiyuan 14
San Francisco 13
Washington 13
Abuja 12
Da Nang 12
Orem 12
Toronto 12
Boston 11
Des Moines 11
Haiphong 11
Phoenix 11
Stockholm 11
Vicenza 11
Warsaw 11
Chennai 10
Redwood City 10
Tashkent 10
Amsterdam 9
Bologna 9
Fairfield 9
Montreal 9
Casablanca 8
Charlotte 8
Dhaka 8
Fuzhou 8
Gent 8
Kent 8
Lappeenranta 8
Nairobi 8
Nuremberg 8
Sydney 8
Totale 10.530
Nome #
Relock-based vulnerability in Windows 7 539
A weakening residuation in adjoining closures 264
Abstract Non-Interference: A unifying framework for weakening information flow 239
Fondamenti dell'informatica. Linguaggi formali, calcolabilità e complessità 239
Abstract Non-Interference 233
Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation 223
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 223
14th International symposium on Verification, Model Checking and Abstract Interpretation 207
A proof System for Abstract Non-Interference 196
SEA: String Executability Analysis by Abstract Interpretation 193
Active Android malware analysis: an approach based on stochastic games 193
Control code obfuscation by abstract interpretation 191
A Unifying View of Abstract Domain Design 189
Data augmentation and transfer learning to classify malware images in a deep learning context 189
A deep learning approach to program similarity. 189
A General Framework for Semantics-Based Bottom-Up Abstract Interpretation of Logic Programs 181
Abductive Analysis of Modular Logic Programs 181
A Bottom-Up Polymorphic Type Inference in Logic Programming 179
"Optimal" Collecting Semantics for Analysis in a Hierarchy of Logic Program Semantics 178
Making abstract models complete 176
Analyzing program dependences for malware detection. 174
A characterization of symmetric semantics by domain complementation 167
Generalized Abstract Non-Interference - Abstract Secure Information-flow Analysis for Automata 167
On Entropy Measures for Code Obfuscation 167
A proof system for Abstract Non-Interference 165
An Abstract Interpretation-based Model for Safety Semantics 165
Adjoining Declassification and Attack Models by Abstract Interpretation 163
Adjoining classified and unclassified information by Abstract Interpretation 161
Building Complete Abstract Interpretations in a Linear Logic-based Setting 161
A Generalized Semantics for Constraint Logic Programs 161
Compositionality in the puzzle of semantics 159
Abstract Interpretation of Indexed Grammars. 158
Weakening Additivity in Adjoining Closures 157
Refining and Compressing Abstract Model Checking 152
Timed Abstract Non-Interference 151
Maximal incompleteness as obfuscation potency 150
Completeness in Approximate Transduction 150
Abstract Interpretation-Based Protection 149
An Application of Constraint Propagation to Data-Flow Analysis 148
Fast location of similar code fragments using semantic 'juice' 148
Abstract interpretation of resolution-based semantics 147
States vs. Traces in Model Checking by Abstract Interpretation 145
Proving abstract non-interference 145
Formal Framework for Property-driven Obfuscations 145
Incompleteness, counterexamples and refinements in abstract model-checking 143
Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation 143
Abstracting Synchronization in Concurrent Constraint Programming 143
Making Abstract Domains Condensing 142
Functional Dependencies and Moore-Set Completions of Abstract Interpretations and Semantics 141
A Fast Implementation of the Octagon Abstract Domain on Graphics Hardware 139
Oracle Semantics for Prolog 139
Learning metamorphic malware signatures from samples 139
Formal framework for reasoning about the precision of dynamic analysis 138
Oracle Semantics for Prolog 137
Abstract extensionality: on the properties of incomplete abstract interpretations 137
Unveiling metamorphism by abstract interpretation of code properties 136
Program Analysis is Harder than Verification: A Computability Perspective 136
Partial (In)Completeness in Abstract Interpretation: Limiting the Imprecision in Program Analysis 136
Strong Preservation by Model Deformation 135
Adjoining classified and unclassified information by Abstract Interpretation 134
Modelling Prolog Control 134
Twisting Additivity in Program Obfuscation 134
Opaque Predicate Detection by Abstract Interpretation 133
The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 130
Analyzing Program Analyses 130
Semantic-based code obfuscation by abstract interpretation 128
Transforming semantics by abstract interpretation 128
Compositional Analysis of Modular Logic Programs 128
Complementing Logic Program Semantics 128
Generalized Semantics and Abstract Interpretation for Constraint Logic Programs 127
Compositional Optimization of Disjunctive Abstract Interpretations 127
A Logic for Locally Complete Abstract Interpretations 126
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 126
What you lose is what you leak: Information leakage in declassification policies 125
An Abstract Interpretation-based Model for Safety Semantics 125
Detecting Determinate Computations by a Bottom-up Abstract Interpretation 125
Semantic-based Code Obfuscation by Abstract Interpretation 124
Modeling Prolog Control 123
Domain Compression for Complete Abstractions 123
Modelling Metamorphism by Abstract Interpretation 122
A²I: abstract² interpretation 122
Obfuscation by Partial Evaluation of Distorted Interpreters 122
Designing Semantics by Domain Complementation 121
Modeling Information Flow Dependencies with Boolean Functions 120
Example-Guided Abstraction Simplification 119
Complementation in Abstract Interpretation 119
Complete Abstract Interpretations Made Constructive 119
Making abstract interpretations complete 118
Hiding Software Watermarks in Loop Structures. 118
Code obfuscation against abstraction refinement attacks 117
Transforming Abstract Interpretations by Abstract Interpretation - New Challenges in Language-based Security 113
Weak Relative Pseudo-Complements of Closure Operators 113
Non-Standard Semantics for Program Slicing 112
Adversities in Abstract Interpretation - Accommodating Robustness by Abstract Interpretation 109
Software Security by Obscurity - A Programming Language Perspective. 109
Incompleteness of States w.r.t. Traces in Model Checking 106
Monotonicity and the Precision of Program Analysis 105
Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking 105
Abstract interpretation repair 104
Toward Digital Asset Protection 102
Totale 15.194
Categoria #
all - tutte 49.881
article - articoli 18.141
book - libri 710
conference - conferenze 26.537
curatela - curatele 536
other - altro 3.221
patent - brevetti 0
selected - selezionate 0
volume - volumi 736
Totale 99.762


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021230 0 0 0 0 0 0 0 0 0 17 93 120
2021/2022775 61 153 26 20 70 13 22 59 53 26 66 206
2022/20231.703 136 130 179 315 165 367 14 110 182 15 58 32
2023/2024955 56 88 86 102 151 87 43 64 19 68 147 44
2024/20252.340 123 217 44 387 109 89 111 220 308 162 224 346
2025/20265.827 553 286 436 768 1.302 447 755 385 500 395 0 0
Totale 16.362