GIACOBAZZI, Roberto
 Distribuzione geografica
Continente #
NA - Nord America 4.743
EU - Europa 3.717
AS - Asia 2.727
SA - Sud America 291
AF - Africa 36
OC - Oceania 10
Continente sconosciuto - Info sul continente non disponibili 3
Totale 11.527
Nazione #
US - Stati Uniti d'America 4.566
GB - Regno Unito 1.303
CN - Cina 1.023
SG - Singapore 960
IT - Italia 536
DE - Germania 376
HK - Hong Kong 365
FR - Francia 322
RU - Federazione Russa 280
BR - Brasile 253
FI - Finlandia 247
IE - Irlanda 228
SE - Svezia 221
CA - Canada 157
VN - Vietnam 99
KR - Corea 71
JP - Giappone 69
UA - Ucraina 61
BE - Belgio 34
ID - Indonesia 27
TR - Turchia 26
AT - Austria 24
IN - India 17
PL - Polonia 15
BD - Bangladesh 12
NL - Olanda 12
IR - Iran 11
VE - Venezuela 9
GR - Grecia 8
IQ - Iraq 8
AR - Argentina 7
AU - Australia 7
MA - Marocco 7
MX - Messico 7
ES - Italia 6
TG - Togo 6
ZA - Sudafrica 6
CL - Cile 5
MK - Macedonia 5
NP - Nepal 5
UZ - Uzbekistan 5
AE - Emirati Arabi Uniti 4
AL - Albania 4
CH - Svizzera 4
EC - Ecuador 4
HR - Croazia 4
SA - Arabia Saudita 4
BG - Bulgaria 3
BO - Bolivia 3
CO - Colombia 3
CR - Costa Rica 3
CZ - Repubblica Ceca 3
KE - Kenya 3
KZ - Kazakistan 3
LT - Lituania 3
PE - Perù 3
RO - Romania 3
TN - Tunisia 3
AI - Anguilla 2
AZ - Azerbaigian 2
DZ - Algeria 2
EE - Estonia 2
EG - Egitto 2
EU - Europa 2
HU - Ungheria 2
IL - Israele 2
KH - Cambogia 2
LU - Lussemburgo 2
MU - Mauritius 2
PT - Portogallo 2
PY - Paraguay 2
QA - Qatar 2
UY - Uruguay 2
AM - Armenia 1
BA - Bosnia-Erzegovina 1
BY - Bielorussia 1
CD - Congo 1
DK - Danimarca 1
DO - Repubblica Dominicana 1
GE - Georgia 1
GH - Ghana 1
GM - Gambi 1
GT - Guatemala 1
HN - Honduras 1
HT - Haiti 1
JM - Giamaica 1
JO - Giordania 1
LA - Repubblica Popolare Democratica del Laos 1
LK - Sri Lanka 1
LV - Lettonia 1
MD - Moldavia 1
MY - Malesia 1
NA - Namibia 1
NO - Norvegia 1
NR - Nauru 1
NZ - Nuova Zelanda 1
OM - Oman 1
PA - Panama 1
PH - Filippine 1
PR - Porto Rico 1
Totale 11.520
Città #
Southend 1.028
Chandler 621
Jacksonville 583
Singapore 492
Woodbridge 455
Hong Kong 362
Dallas 354
Ann Arbor 288
Houston 273
Ashburn 240
Dublin 224
Verona 186
Munich 153
Wilmington 115
Montréal 114
Beijing 113
Mcallen 107
Lawrence 106
Princeton 106
Jinan 101
The Dalles 94
Nanjing 78
Milan 68
Helsinki 65
Shenyang 63
Tokyo 63
Dong Ket 61
Hebei 57
Changsha 55
Boardman 47
Los Angeles 47
New York 44
Buffalo 41
Columbus 40
Haikou 38
Sindelfingen 37
Tianjin 36
Council Bluffs 34
Zhengzhou 34
Santa Clara 33
Guangzhou 29
Hangzhou 27
Seattle 27
Jakarta 26
Brussels 24
Nanchang 22
Jiaxing 21
Rome 21
Ningbo 20
Paris 20
Taizhou 20
São Paulo 18
Seoul 16
Chicago 14
Falkenstein 14
Lanzhou 14
London 14
Ottawa 14
Redondo Beach 14
Rio de Janeiro 14
Taiyuan 14
Vienna 14
Brooklyn 13
San Francisco 13
Washington 13
Frankfurt am Main 12
Boston 11
Moscow 11
Redwood City 10
Fairfield 9
Stockholm 9
Toronto 9
Vicenza 9
Warsaw 9
Bologna 8
Charlotte 8
Fuzhou 8
Gent 8
Kent 8
Montreal 8
Nuremberg 8
Phoenix 8
Brescia 7
Catanzaro 7
Lappeenranta 7
Norwalk 7
Nowon-gu 7
Sydney 7
Chennai 6
Edinburgh 6
Lomé 6
Pisa 6
Venice 6
Atlanta 5
Auburn Hills 5
Belo Horizonte 5
Bressanone 5
Casablanca 5
Hanoi 5
Mehlingen 5
Totale 7.772
Nome #
Relock-based vulnerability in Windows 7 504
Abstract Non-Interference: A unifying framework for weakening information flow 183
A weakening residuation in adjoining closures 180
Fondamenti dell'informatica. Linguaggi formali, calcolabilità e complessità 177
Abstract Non-Interference 176
Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation 154
SEA: String Executability Analysis by Abstract Interpretation 149
Active Android malware analysis: an approach based on stochastic games 148
14th International symposium on Verification, Model Checking and Abstract Interpretation 146
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 146
Control code obfuscation by abstract interpretation 140
Making abstract models complete 139
A proof System for Abstract Non-Interference 138
An Abstract Interpretation-based Model for Safety Semantics 134
Adjoining classified and unclassified information by Abstract Interpretation 130
A Bottom-Up Polymorphic Type Inference in Logic Programming 130
Abductive Analysis of Modular Logic Programs 128
Building Complete Abstract Interpretations in a Linear Logic-based Setting 126
Data augmentation and transfer learning to classify malware images in a deep learning context 126
A Unifying View of Abstract Domain Design 125
Timed Abstract Non-Interference 124
On Entropy Measures for Code Obfuscation 124
"Optimal" Collecting Semantics for Analysis in a Hierarchy of Logic Program Semantics 123
A deep learning approach to program similarity. 120
Adjoining Declassification and Attack Models by Abstract Interpretation 119
Generalized Abstract Non-Interference - Abstract Secure Information-flow Analysis for Automata 119
Refining and Compressing Abstract Model Checking 118
A General Framework for Semantics-Based Bottom-Up Abstract Interpretation of Logic Programs 118
Functional Dependencies and Moore-Set Completions of Abstract Interpretations and Semantics 118
Compositionality in the puzzle of semantics 117
Analyzing program dependences for malware detection. 117
Weakening Additivity in Adjoining Closures 117
Fast location of similar code fragments using semantic 'juice' 116
A characterization of symmetric semantics by domain complementation 115
Twisting Additivity in Program Obfuscation 114
Incompleteness, counterexamples and refinements in abstract model-checking 113
States vs. Traces in Model Checking by Abstract Interpretation 111
Proving abstract non-interference 111
An Application of Constraint Propagation to Data-Flow Analysis 110
Oracle Semantics for Prolog 110
Oracle Semantics for Prolog 110
Formal Framework for Property-driven Obfuscations 109
The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 109
A proof system for Abstract Non-Interference 108
Modelling Prolog Control 106
Transforming semantics by abstract interpretation 105
Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation 104
Abstracting Synchronization in Concurrent Constraint Programming 104
Making Abstract Domains Condensing 102
Maximal incompleteness as obfuscation potency 102
Semantic-based code obfuscation by abstract interpretation 101
Abstract interpretation of resolution-based semantics 101
Adjoining classified and unclassified information by Abstract Interpretation 101
Abstract Interpretation-Based Protection 101
Analyzing Program Analyses 100
A Generalized Semantics for Constraint Logic Programs 99
Compositional Optimization of Disjunctive Abstract Interpretations 98
Strong Preservation by Model Deformation 97
Completeness in Approximate Transduction 97
Complementing Logic Program Semantics 97
Compositional Analysis of Modular Logic Programs 96
Modeling Information Flow Dependencies with Boolean Functions 95
Designing Semantics by Domain Complementation 95
Detecting Determinate Computations by a Bottom-up Abstract Interpretation 95
Unveiling metamorphism by abstract interpretation of code properties 95
Abstract Interpretation of Indexed Grammars. 95
Domain Compression for Complete Abstractions 94
A Fast Implementation of the Octagon Abstract Domain on Graphics Hardware 93
Example-Guided Abstraction Simplification 93
Partial (In)Completeness in Abstract Interpretation: Limiting the Imprecision in Program Analysis 92
What you lose is what you leak: Information leakage in declassification policies 91
Modeling Prolog Control 91
An Abstract Interpretation-based Model for Safety Semantics 90
Complete Abstract Interpretations Made Constructive 90
Opaque Predicate Detection by Abstract Interpretation 89
Complementation in Abstract Interpretation 89
Generalized Semantics and Abstract Interpretation for Constraint Logic Programs 88
Abstract extensionality: on the properties of incomplete abstract interpretations 86
Semantic-based Code Obfuscation by Abstract Interpretation 85
Obfuscation by Partial Evaluation of Distorted Interpreters 85
Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking 85
Modelling Metamorphism by Abstract Interpretation 84
Program Analysis is Harder than Verification: A Computability Perspective 84
Transforming Abstract Interpretations by Abstract Interpretation - New Challenges in Language-based Security 84
Weak Relative Pseudo-Complements of Closure Operators 84
Software Security by Obscurity - A Programming Language Perspective. 83
Hiding Software Watermarks in Loop Structures. 82
Making abstract interpretations complete 81
Formal framework for reasoning about the precision of dynamic analysis 81
Learning metamorphic malware signatures from samples 81
Non-Standard Semantics for Program Slicing 80
Toward Digital Asset Protection 78
A Logic for Locally Complete Abstract Interpretations 77
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 76
Incompleteness of States w.r.t. Traces in Model Checking 75
A²I: abstract² interpretation 73
Code obfuscation against abstraction refinement attacks 72
Principles of POPL 71
Foreword: programming language interference and dependence 71
Foreword: Special issue on the 11th Static Analysis Symposium - SAS 2004 68
Totale 11.061
Categoria #
all - tutte 40.319
article - articoli 14.580
book - libri 595
conference - conferenze 21.450
curatela - curatele 434
other - altro 2.650
patent - brevetti 0
selected - selezionate 0
volume - volumi 610
Totale 80.638


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021732 0 0 35 94 119 98 15 88 53 17 93 120
2021/2022775 61 153 26 20 70 13 22 59 53 26 66 206
2022/20231.703 136 130 179 315 165 367 14 110 182 15 58 32
2023/2024955 56 88 86 102 151 87 43 64 19 68 147 44
2024/20252.340 123 217 44 387 109 89 111 220 308 162 224 346
2025/20261.212 553 286 373 0 0 0 0 0 0 0 0 0
Totale 11.747