VIGANO', Luca
 Distribuzione geografica
Continente #
NA - Nord America 6.189
EU - Europa 5.183
AS - Asia 4.114
SA - Sud America 476
AF - Africa 114
OC - Oceania 14
Continente sconosciuto - Info sul continente non disponibili 4
Totale 16.094
Nazione #
US - Stati Uniti d'America 6.086
RU - Federazione Russa 1.900
SG - Singapore 1.678
CN - Cina 1.347
GB - Regno Unito 1.132
IT - Italia 444
FR - Francia 363
BR - Brasile 354
VN - Vietnam 319
HK - Hong Kong 312
SE - Svezia 303
DE - Germania 270
IE - Irlanda 252
FI - Finlandia 243
KR - Corea 171
UA - Ucraina 86
BE - Belgio 62
CA - Canada 56
AR - Argentina 50
IN - India 49
TR - Turchia 46
NG - Nigeria 41
BD - Bangladesh 36
MX - Messico 29
ES - Italia 22
JP - Giappone 22
NL - Olanda 22
ID - Indonesia 21
PL - Polonia 17
ZA - Sudafrica 17
IQ - Iraq 16
MY - Malesia 15
AU - Australia 13
CL - Cile 13
CM - Camerun 13
DK - Danimarca 13
EC - Ecuador 13
CO - Colombia 10
PK - Pakistan 10
SA - Arabia Saudita 10
PE - Perù 9
VE - Venezuela 9
AT - Austria 8
MA - Marocco 8
PH - Filippine 8
PY - Paraguay 8
AE - Emirati Arabi Uniti 7
DZ - Algeria 7
IR - Iran 7
UZ - Uzbekistan 7
HN - Honduras 6
JO - Giordania 6
KE - Kenya 6
RS - Serbia 6
BO - Bolivia 5
GR - Grecia 5
IL - Israele 5
LU - Lussemburgo 5
UY - Uruguay 5
AZ - Azerbaigian 4
CH - Svizzera 4
DO - Repubblica Dominicana 4
ET - Etiopia 4
NP - Nepal 4
RO - Romania 4
TN - Tunisia 4
BG - Bulgaria 3
EG - Egitto 3
EU - Europa 3
HU - Ungheria 3
LT - Lituania 3
LV - Lettonia 3
AO - Angola 2
BN - Brunei Darussalam 2
CR - Costa Rica 2
GA - Gabon 2
HR - Croazia 2
MD - Moldavia 2
MN - Mongolia 2
NI - Nicaragua 2
NO - Norvegia 2
SN - Senegal 2
A2 - ???statistics.table.value.countryCode.A2??? 1
AF - Afghanistan, Repubblica islamica di 1
AL - Albania 1
AM - Armenia 1
BB - Barbados 1
BH - Bahrain 1
CG - Congo 1
CI - Costa d'Avorio 1
CY - Cipro 1
EE - Estonia 1
GT - Guatemala 1
JM - Giamaica 1
KH - Cambogia 1
KZ - Kazakistan 1
LB - Libano 1
LY - Libia 1
MK - Macedonia 1
MO - Macao, regione amministrativa speciale della Cina 1
Totale 16.087
Città #
Southend 909
Singapore 908
Jacksonville 750
Chandler 655
Woodbridge 581
Moscow 537
Ashburn 526
San Jose 489
Ann Arbor 414
Dallas 373
Houston 350
Hong Kong 300
Verona 253
Dublin 252
The Dalles 216
Beijing 147
Nanjing 139
Lawrence 118
Princeton 118
Jinan 109
Ho Chi Minh City 107
Wilmington 98
Shenyang 81
Los Angeles 80
Hanoi 70
Columbus 63
Brussels 60
Buffalo 54
Seoul 53
Changsha 52
Tianjin 52
Milan 48
Hebei 43
Sindelfingen 43
Zhengzhou 41
Abuja 40
Nanchang 40
Boardman 39
Santa Clara 39
Lancaster 38
Ningbo 35
Frankfurt am Main 34
Haikou 32
Munich 30
Taizhou 30
Helsinki 29
Hangzhou 28
New York 28
São Paulo 27
Guangzhou 26
Redondo Beach 23
Taiyuan 21
Des Moines 20
Cambridge 19
Norwalk 19
Belo Horizonte 18
Council Bluffs 18
Jiaxing 18
San Francisco 18
Brooklyn 17
Montreal 17
Lanzhou 16
Toronto 16
London 15
Orem 15
Rio de Janeiro 15
Tokyo 15
Chicago 14
Washington 13
Amsterdam 12
Boston 12
Da Nang 12
Atlanta 11
Fuzhou 11
Warsaw 11
Chennai 10
Dhaka 10
Hải Dương 10
Johannesburg 10
Seattle 10
Turku 10
Auburn Hills 9
Phoenix 9
Biên Hòa 8
Denver 8
Haiphong 8
Istanbul 8
Dong Ket 7
Groningen 7
Kuala Lumpur 7
Lima 7
Manchester 7
Paris 7
Riyadh 7
Tappahannock 7
Buenos Aires 6
Charlotte 6
Copenhagen 6
Elora 6
Jakarta 6
Totale 10.176
Nome #
Quantum State Transformations and Branching Distributed Temporal Logic 267
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis 263
A Hierarchy of Knowledge for the Formal Analysis of Security-Sensitive Business Processes 254
On the mosaic method for many-dimensional modal logics: a case study combining tense and modal operators 242
A labeled deduction system for the logic UB 232
Workflow and Access Control Reloaded: a Declarative Specification Framework for the Automated Analysis of Web Services 229
Blocking Underhand Attacks by Hidden Coalitions 227
A Declarative Two-Level Framework to Specify and Verify Workflow and Authorization Policies in Service-Oriented Architectures 208
A Deduction System for Meaning Negotiation 206
Towards Formal Validation of Trust and Security in the Internet of Services 204
A History of Until 201
Security protocols as environments: A lesson from non-collaboration 195
Distributed Temporal Logic for the Analysis of Security Protocol Models 194
An Environmental Paradigm for Defending Security Protocols 189
A Qualitative Modal Representation of Quantum Register Transformations 188
Access Controlled Temporal Networks 187
A Branching Distributed Temporal Logic for Reasoning about Entanglement-Free Quantum State Transformations 181
WSSMT: Towards the Automated Analysis of Security-Sensitive Services and Applications 180
Conditional Simple Temporal Networks with Uncertainty and Resources 174
Towards a Logical Framework for Reasoning about Risk 170
Using interpolation for the verification of security protocols 170
A complete tableau procedure for risk analysis 169
A Recipe for the Complexity Analysis of Non-Classical Logics 168
A Labeled Natural Deduction System for a Fragment of CTL∗ 168
Security is Beautiful 168
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures 167
A New Method for Bounding the Complexity of Modal Logics 164
A Formal Approach to Analyzing Cyber-Forensics Evidence 164
Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection 163
A Modular Presentation of Modal Logics in a Logical Framework 160
Attack Interference: A Path to Defending Security Protocols 160
A Formal Data-Model of the CORBA Security Service 158
Security is Beautiful (Transcript of Discussion) 158
A Topography of Labelled Model Logics 157
Alice and Bob: Reconciling Formal Models and Implementation 157
A Formalization of Off-Line Guessing for Security Protocol Analysis 156
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures 155
Back from the future 154
Hybrid SAT-Based Consistency Checking Algorithms for Simple Temporal Networks with Decisions 154
A labeled tableaux system for the Distributed Temporal Logic DTL 152
An automated approach for testing the security of web applications against chained attacks 152
A Formal Analysis of the CORBA Security Service 149
Weak, Strong and Dynamic Controllability of Access-Controlled Workflows Under Conditional Uncertainty 149
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) 148
Automated Validation of Security-sensitive Web Services specified in BPEL and RBAC 147
Labelled natural deduction for a bundled branching temporal logic 140
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment 140
Model Checking Ad Hoc Network Routing Protocols: ARAN vs. endairA 137
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-mechanizable Activities 137
Constraint Networks Under Conditional Uncertainty 136
An O(n log n)-Space Decision Procedure for the Relevance Logic B+ 135
A Topological Categorization of Agents for the Definition of Attack States in Multi-agent Systems 135
Conditional Uncertainty in Constraint Networks 134
Labelled Propositional Modal Logics: Theory and Practice 133
Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way 130
Modal Deduction Systems for Quantum State Transformations 129
Automated Security Protocol Analysis With the AVISPA Tool 128
Labelled quantified modal logics 126
Last man standing: Static, decremental and dynamic resiliency via controller synthesis 125
An On-The-Fly Model-Checker for Security Protocol Analysis 123
Modal Specifications of Trace-Based Security Properties 123
Towards an awareness-based semantics for security protocol analysis 123
Deconstructing Alice and Bob 123
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols 121
Constraint Differentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols 121
Modal Sequent Calculi Labelled with Truth-values: Completeness, Duality and Analyticity 120
OFMC: A Symbolic Model-Checker for Security Protocols 120
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications 120
Labelled Non-Classical Logics 119
SEL Compiler and Abstract Analyzers 119
Labeled natural deduction systems for a family of tense logics 119
Labelled Modal Logics: Quantifiers 118
SecTest 2011, the Second International Workshop on Security Testing 117
Conditional simple temporal networks with uncertainty and decisions 117
Natural Deduction for Non-Classical Logics 115
Algebraic Intruder Deductions 115
Labelled Deduction 115
Formalizing and Analyzing Sender Invariance 114
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols 114
Resource Controllability of Workflows Under Conditional Uncertainty 114
Security Constraints in Temporal Role-Based Access-Controlled Workflows 114
Building and executing proof strategies in a formal metatheory 113
Automated Validation of Trust and Security of Service-Oriented Architectures with the AVANTSSAR Platform (Extended Abstract) 111
Modal logics K, T, K4, S4: labelled proof systems and new complexity results 110
The AVISS Security Protocol Analysis Tool 110
Symbolic and Cryptographic Analysis of the Secure WS-Reliable Messaging Scenario 107
Towards a Metalogic for Security Protocol Analysis 105
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols (Extended Abstract) 105
Truth-values as labels: a general recipe for labelled deduction 105
On the semantics of Alice&Bob specifications of security protocols 104
Secure Pseudonymous Channels 104
Metareasoning about Security Protocols using Distributed Temporal Logic 103
My Galois 103
Tableau systems for reasoning about risk 103
Fibring Labelled Deduction Systems 102
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis 102
Labelled Deduction over Algebras of Truth-Values 100
Galois 100
Implementing modal and relevance logics in a logical framework 98
Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion) 97
Totale 14.609
Categoria #
all - tutte 50.502
article - articoli 16.848
book - libri 713
conference - conferenze 30.132
curatela - curatele 1.307
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 1.502
Totale 101.004


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021165 0 0 0 0 0 0 0 0 0 14 107 44
2021/2022989 58 312 14 22 79 29 22 52 27 32 77 265
2022/20231.922 156 160 178 329 182 422 17 138 235 16 65 24
2023/2024757 50 79 61 92 89 66 48 67 5 72 87 41
2024/20252.159 107 219 50 413 67 54 82 140 307 124 208 388
2025/20265.911 508 318 419 868 1.394 439 687 447 439 392 0 0
Totale 16.205