GIACOBAZZI, Roberto
 Distribuzione geografica
Continente #
EU - Europa 4.980
NA - Nord America 4.942
AS - Asia 3.182
SA - Sud America 333
AF - Africa 51
OC - Oceania 10
Continente sconosciuto - Info sul continente non disponibili 4
Totale 13.502
Nazione #
US - Stati Uniti d'America 4.762
RU - Federazione Russa 1.496
GB - Regno Unito 1.308
CN - Cina 1.150
SG - Singapore 1.149
IT - Italia 544
DE - Germania 383
HK - Hong Kong 373
FR - Francia 325
BR - Brasile 275
FI - Finlandia 262
IE - Irlanda 229
SE - Svezia 223
VN - Vietnam 185
CA - Canada 158
KR - Corea 82
JP - Giappone 70
UA - Ucraina 61
ID - Indonesia 37
BE - Belgio 34
TR - Turchia 28
IN - India 26
AT - Austria 24
BD - Bangladesh 17
PL - Polonia 17
AR - Argentina 15
ZA - Sudafrica 13
NL - Olanda 12
VE - Venezuela 12
IR - Iran 11
MA - Marocco 9
CO - Colombia 8
ES - Italia 8
GR - Grecia 8
IQ - Iraq 8
MX - Messico 8
AU - Australia 7
CL - Cile 6
SA - Arabia Saudita 6
TG - Togo 6
BO - Bolivia 5
EC - Ecuador 5
MK - Macedonia 5
NP - Nepal 5
UZ - Uzbekistan 5
AE - Emirati Arabi Uniti 4
AL - Albania 4
CH - Svizzera 4
EG - Egitto 4
HR - Croazia 4
LT - Lituania 4
TN - Tunisia 4
BG - Bulgaria 3
CR - Costa Rica 3
CZ - Repubblica Ceca 3
IL - Israele 3
KE - Kenya 3
KZ - Kazakistan 3
MY - Malesia 3
PE - Perù 3
RO - Romania 3
AI - Anguilla 2
AZ - Azerbaigian 2
BJ - Benin 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
EE - Estonia 2
EU - Europa 2
HU - Ungheria 2
JO - Giordania 2
KH - Cambogia 2
LU - Lussemburgo 2
MD - Moldavia 2
MU - Mauritius 2
PT - Portogallo 2
PY - Paraguay 2
QA - Qatar 2
UY - Uruguay 2
XK - ???statistics.table.value.countryCode.XK??? 2
AM - Armenia 1
BA - Bosnia-Erzegovina 1
BY - Bielorussia 1
CD - Congo 1
DK - Danimarca 1
GE - Georgia 1
GH - Ghana 1
GM - Gambi 1
GT - Guatemala 1
HN - Honduras 1
HT - Haiti 1
JM - Giamaica 1
LA - Repubblica Popolare Democratica del Laos 1
LK - Sri Lanka 1
LV - Lettonia 1
NA - Namibia 1
NO - Norvegia 1
NR - Nauru 1
NZ - Nuova Zelanda 1
OM - Oman 1
PA - Panama 1
Totale 13.492
Città #
Southend 1.028
Chandler 621
Jacksonville 583
Singapore 521
Moscow 460
Woodbridge 455
Dallas 378
Hong Kong 370
Ashburn 326
Ann Arbor 288
Houston 276
Dublin 225
Verona 186
Beijing 158
Munich 156
Wilmington 115
Montréal 114
Mcallen 107
Lawrence 106
Princeton 106
Jinan 103
The Dalles 95
Nanjing 78
Milan 71
Helsinki 67
Los Angeles 66
Tokyo 64
Shenyang 63
Dong Ket 61
Hebei 57
Changsha 56
Boardman 49
New York 49
Buffalo 48
Columbus 40
Tianjin 39
Haikou 38
Sindelfingen 37
Ho Chi Minh City 35
Santa Clara 35
Council Bluffs 34
Zhengzhou 34
Redondo Beach 33
Guangzhou 30
Hangzhou 27
Jakarta 27
Seattle 27
Hanoi 25
Brussels 24
Nanchang 22
Jiaxing 21
Rome 21
Ningbo 20
Paris 20
São Paulo 20
Taizhou 20
Rio de Janeiro 17
Frankfurt am Main 16
London 16
Seoul 16
Chicago 15
Turku 15
Falkenstein 14
Lanzhou 14
Ottawa 14
Taiyuan 14
Vienna 14
Brooklyn 13
San Francisco 13
Washington 13
Boston 11
Stockholm 11
Vicenza 11
Des Moines 10
Johannesburg 10
Redwood City 10
Warsaw 10
Fairfield 9
Montreal 9
Toronto 9
Bologna 8
Charlotte 8
Fuzhou 8
Gent 8
Kent 8
Lappeenranta 8
Nuremberg 8
Phoenix 8
Brescia 7
Catanzaro 7
Chennai 7
Norwalk 7
Nowon-gu 7
Sydney 7
Atlanta 6
Da Nang 6
Edinburgh 6
Lomé 6
Pisa 6
Venice 6
Totale 8.581
Nome #
Relock-based vulnerability in Windows 7 515
Abstract Non-Interference: A unifying framework for weakening information flow 214
A weakening residuation in adjoining closures 213
Abstract Non-Interference 206
Fondamenti dell'informatica. Linguaggi formali, calcolabilità e complessità 199
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 186
Abstract Non-Interference: Parameterizing Non-Interference by Abstract Interpretation 183
14th International symposium on Verification, Model Checking and Abstract Interpretation 177
SEA: String Executability Analysis by Abstract Interpretation 175
Active Android malware analysis: an approach based on stochastic games 172
A proof System for Abstract Non-Interference 171
Control code obfuscation by abstract interpretation 168
Data augmentation and transfer learning to classify malware images in a deep learning context 160
A deep learning approach to program similarity. 159
A Bottom-Up Polymorphic Type Inference in Logic Programming 156
Making abstract models complete 153
A Unifying View of Abstract Domain Design 153
Analyzing program dependences for malware detection. 151
Abductive Analysis of Modular Logic Programs 151
"Optimal" Collecting Semantics for Analysis in a Hierarchy of Logic Program Semantics 150
An Abstract Interpretation-based Model for Safety Semantics 148
A General Framework for Semantics-Based Bottom-Up Abstract Interpretation of Logic Programs 146
A characterization of symmetric semantics by domain complementation 144
Adjoining classified and unclassified information by Abstract Interpretation 142
A proof system for Abstract Non-Interference 142
On Entropy Measures for Code Obfuscation 140
Refining and Compressing Abstract Model Checking 137
Building Complete Abstract Interpretations in a Linear Logic-based Setting 136
Fast location of similar code fragments using semantic 'juice' 131
Generalized Abstract Non-Interference - Abstract Secure Information-flow Analysis for Automata 130
Timed Abstract Non-Interference 130
Adjoining Declassification and Attack Models by Abstract Interpretation 129
Abstract Interpretation-Based Protection 129
Abstract Interpretation of Indexed Grammars. 128
Compositionality in the puzzle of semantics 127
A Generalized Semantics for Constraint Logic Programs 127
Weakening Additivity in Adjoining Closures 127
Functional Dependencies and Moore-Set Completions of Abstract Interpretations and Semantics 126
An Application of Constraint Propagation to Data-Flow Analysis 125
Completeness in Approximate Transduction 125
Formal Framework for Property-driven Obfuscations 124
States vs. Traces in Model Checking by Abstract Interpretation 123
Incompleteness, counterexamples and refinements in abstract model-checking 122
Abstract interpretation of resolution-based semantics 121
Twisting Additivity in Program Obfuscation 121
Proving abstract non-interference 120
Oracle Semantics for Prolog 120
Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation 119
Oracle Semantics for Prolog 119
Modelling Prolog Control 118
A Fast Implementation of the Octagon Abstract Domain on Graphics Hardware 117
Abstracting Synchronization in Concurrent Constraint Programming 117
The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 116
Making Abstract Domains Condensing 115
Strong Preservation by Model Deformation 115
Maximal incompleteness as obfuscation potency 115
Adjoining classified and unclassified information by Abstract Interpretation 114
Abstract extensionality: on the properties of incomplete abstract interpretations 114
Partial (In)Completeness in Abstract Interpretation: Limiting the Imprecision in Program Analysis 114
Transforming semantics by abstract interpretation 113
Semantic-based code obfuscation by abstract interpretation 112
Formal framework for reasoning about the precision of dynamic analysis 111
Unveiling metamorphism by abstract interpretation of code properties 110
Analyzing Program Analyses 110
Compositional Optimization of Disjunctive Abstract Interpretations 109
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables 109
Program Analysis is Harder than Verification: A Computability Perspective 107
Domain Compression for Complete Abstractions 107
A Logic for Locally Complete Abstract Interpretations 107
Compositional Analysis of Modular Logic Programs 106
An Abstract Interpretation-based Model for Safety Semantics 105
Detecting Determinate Computations by a Bottom-up Abstract Interpretation 105
Complementing Logic Program Semantics 105
Learning metamorphic malware signatures from samples 105
Modeling Information Flow Dependencies with Boolean Functions 104
Modeling Prolog Control 104
Generalized Semantics and Abstract Interpretation for Constraint Logic Programs 104
Designing Semantics by Domain Complementation 103
Example-Guided Abstraction Simplification 102
What you lose is what you leak: Information leakage in declassification policies 101
Modelling Metamorphism by Abstract Interpretation 101
Opaque Predicate Detection by Abstract Interpretation 100
Semantic-based Code Obfuscation by Abstract Interpretation 100
Obfuscation by Partial Evaluation of Distorted Interpreters 100
Complementation in Abstract Interpretation 99
Complete Abstract Interpretations Made Constructive 99
Transforming Abstract Interpretations by Abstract Interpretation - New Challenges in Language-based Security 99
Weak Relative Pseudo-Complements of Closure Operators 95
Hiding Information in Completeness Holes: New Perspectives in Code Obfuscation and Watermarking 95
Hiding Software Watermarks in Loop Structures. 94
Software Security by Obscurity - A Programming Language Perspective. 94
Non-Standard Semantics for Program Slicing 92
A²I: abstract² interpretation 92
Code obfuscation against abstraction refinement attacks 91
Making abstract interpretations complete 89
Toward Digital Asset Protection 87
Incompleteness of States w.r.t. Traces in Model Checking 85
Principles of POPL 82
Foreword: programming language interference and dependence 82
Abstract interpretation repair 79
Totale 12.819
Categoria #
all - tutte 44.781
article - articoli 16.235
book - libri 642
conference - conferenze 23.837
curatela - curatele 479
other - altro 2.922
patent - brevetti 0
selected - selezionate 0
volume - volumi 666
Totale 89.562


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021603 0 0 0 0 119 98 15 88 53 17 93 120
2021/2022775 61 153 26 20 70 13 22 59 53 26 66 206
2022/20231.703 136 130 179 315 165 367 14 110 182 15 58 32
2023/2024955 56 88 86 102 151 87 43 64 19 68 147 44
2024/20252.340 123 217 44 387 109 89 111 220 308 162 224 346
2025/20263.187 553 286 436 768 1.144 0 0 0 0 0 0 0
Totale 13.722