CECCATO, Mariano
 Distribuzione geografica
Continente #
NA - Nord America 1.990
AS - Asia 1.394
EU - Europa 1.377
SA - Sud America 160
AF - Africa 27
Continente sconosciuto - Info sul continente non disponibili 1
Totale 4.949
Nazione #
US - Stati Uniti d'America 1.966
SG - Singapore 634
CN - Cina 379
IT - Italia 274
RU - Federazione Russa 203
HK - Hong Kong 190
FR - Francia 165
GB - Regno Unito 161
BR - Brasile 142
SE - Svezia 140
IE - Irlanda 128
DE - Germania 107
KR - Corea 78
FI - Finlandia 55
UA - Ucraina 39
VN - Vietnam 37
AT - Austria 20
NL - Olanda 18
BE - Belgio 16
ID - Indonesia 16
JP - Giappone 15
TG - Togo 13
CA - Canada 12
PL - Polonia 10
CZ - Repubblica Ceca 9
ES - Italia 8
IN - India 8
MX - Messico 7
LU - Lussemburgo 6
ZA - Sudafrica 5
AR - Argentina 4
EC - Ecuador 4
TH - Thailandia 4
TW - Taiwan 4
VE - Venezuela 4
AE - Emirati Arabi Uniti 3
BD - Bangladesh 3
IL - Israele 3
IR - Iran 3
JO - Giordania 3
PK - Pakistan 3
PY - Paraguay 3
TR - Turchia 3
DK - Danimarca 2
DZ - Algeria 2
EE - Estonia 2
LT - Lituania 2
MA - Marocco 2
MY - Malesia 2
NP - Nepal 2
PT - Portogallo 2
AL - Albania 1
AO - Angola 1
BO - Bolivia 1
BZ - Belize 1
CH - Svizzera 1
CL - Cile 1
CR - Costa Rica 1
EU - Europa 1
GR - Grecia 1
HN - Honduras 1
HU - Ungheria 1
IQ - Iraq 1
IS - Islanda 1
JM - Giamaica 1
KE - Kenya 1
KZ - Kazakistan 1
LB - Libano 1
LV - Lettonia 1
MK - Macedonia 1
NE - Niger 1
NI - Nicaragua 1
NO - Norvegia 1
OM - Oman 1
RE - Reunion 1
SI - Slovenia 1
SK - Slovacchia (Repubblica Slovacca) 1
TN - Tunisia 1
UY - Uruguay 1
Totale 4.949
Città #
Dallas 457
Chandler 295
Singapore 266
Hong Kong 189
Jacksonville 132
Beijing 129
Southend 128
Dublin 126
Ashburn 93
The Dalles 67
Wilmington 59
Princeton 57
Lawrence 56
Milan 56
Sindelfingen 53
Verona 44
Los Angeles 43
Bari 39
Council Bluffs 39
Helsinki 39
Buffalo 31
Columbus 31
Redondo Beach 25
Redwood City 23
Seattle 23
Santa Clara 22
Houston 21
New York 20
Rome 18
Jinan 17
San Francisco 17
Ann Arbor 16
Brussels 15
Amsterdam 13
Lomé 13
Tokyo 13
Brooklyn 12
Vienna 12
Dong Ket 11
São Paulo 11
Chicago 10
Falkenstein 10
Jakarta 10
Norwalk 10
Brno 9
Changsha 9
Falls Church 9
Lappeenranta 9
London 9
Nuremberg 9
Shenyang 8
Stockholm 8
Taizhou 8
Fairfield 7
Nanjing 7
Warsaw 7
Zhengzhou 7
Frankfurt am Main 6
Hanoi 6
Ho Chi Minh City 6
Mexico City 6
Rimini 6
Trieste 6
Atlanta 5
Johannesburg 5
Manchester 5
Montreal 5
Naples 5
Oxford 5
Dongguan 4
Garanhuns 4
Guangzhou 4
Lana 4
Luxembourg 4
Rio de Janeiro 4
Roseville 4
Roubaix 4
Seoul 4
Taiyuan 4
Turin 4
Veranópolis 4
Alexandria 3
Amman 3
Belo Horizonte 3
Benevento 3
Biên Hòa 3
Cesena 3
Chāībāsa 3
Cologno Monzese 3
Denver 3
Fürth 3
Guayaquil 3
Hamden 3
Las Vegas 3
Madrid 3
Mehlingen 3
Moscow 3
Nakhon Ratchasima 3
Nanchang 3
Ningbo 3
Totale 3.048
Nome #
MITHRAS: A Dynamic Analysis Framework for the Mobile-IoT Ecosystem 213
Remote software protection by orthogonal client replacement 117
Barrier Slicing for Remote Software Trusting 114
EtherSolve: Computing an Accurate Control-Flow Graph from Ethereum Bytecode 112
Qsynth - a program synthesis based approach for binary code deobfuscation 110
6. Automated Assistance to the Security Assessment of API for Financial Services 94
A Framework for In-Vivo Testing of Mobile Applications 94
Experimental assessment of XOR-Masking data obfuscation based on K-Clique opaque constants 91
Enhancing Ethereum smart-contracts static analysis by computing a precise Control-Flow Graph of Ethereum bytecode 90
Empirical assessment of the effort needed to attack programs protected with client/server code splitting 88
A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps 88
Comparison and integration of genetic algorithms and dynamic symbolic execution for security testing of cross-site scripting vulnerabilities 87
Tool-Supported Refactoring of Existing Object-Oriented Code into Aspects 86
Understanding the behaviour of hackers while performing attack tasks in a professional setting and in a public challenge 85
A Family of Experiments to Assess the Impact of Page Object Pattern in Web Test Suite Development 84
Ahab’s legs in scenario-based requirements validation: An experiment to study communication mistakes 83
RestTestGen: Automated Black-Box Testing of RESTful APIs 82
Security analysis of permission re-delegation vulnerabilities in Android apps 81
Trading-off security and performance in barrier slicing for remote software entrusting 80
A family of experiments to assess the effectiveness and efficiency of source code obfuscation techniques 79
The ASPIRE Framework for Software Protection 79
Do Automatically Generated Test Cases Make Debugging Easier? An Experimental Assessment of Debugging Effectiveness and Efficiency 78
CodeBender: Remote Software Protection Using Orthogonal Replacement 77
Automatic generation of opaque constants based on the k-clique problem for resilient data obfuscation 74
COSMO: Code Coverage Made Easier for Android 73
Obfuscating Java Programs by Translating Selected Portions of Bytecode to Native Libraries 72
Automated black-box testing of nominal and error scenarios in RESTful APIs 71
Do Security Reports Meet Usability? 70
Applying and combining three different aspect Mining Techniques 68
A large study on the effect of code obfuscation on the quality of java code 68
Migrating legacy data structures based on variable overlay to Java 67
Guest editorial for the special issue on source code analysis and manipulation, SCAM 2012 66
Summary of: A Federated Society of Bots for Smart Contract Testing 65
Hypertesting of Programs: Theoretical Foundation and Automated Test Generation 64
OBLIVE: Seamless Code Obfuscation for Java Programs and Android Apps 64
Anflo: Detecting anomalous sensitive information flows in android apps 64
Search Based Clustering for Protecting Software with Diversified Updates 64
Supporting wine production from vineyard to glass through secure IoT devices and blockchain 63
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning 63
How Professional Hackers Understand Protected Code while Performing Attack Tasks 63
Experimental comparison of features and classifiers for Android malware detection 63
A federated society of bots for smart contract testing 62
Security layers for neuromorphic photonic accelerators 61
Dynamic aspect mining 61
Empirical Comparison of Black-box Test Case Generation Tools for RESTful APIs 61
Mitigating Debugger-based Attacks to Java Applications with Self-Debugging 60
Migrazione di sistemi software legacy 60
A Reference Architecture for Software Protection 59
Restats: A Test Coverage Tool for RESTful APIs 57
Integrating Smart Contracts in Manufacturing for Automated Assessment of Production Quality 56
Assessment of Source Code Obfuscation Techniques 56
Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs 55
RESTgym: A Flexible Infrastructure for Empirical Assessment of Automated REST API Testing Tools 51
Towards Reverse Engineering of Industrial Physical Processes 51
How Developers' Experience and Ability Influence Web Application Comprehension Tasks Supported by UML Stereotypes: A Series of Four Experiments 51
Identifying Android Inter App Communication Vulnerabilities Using Static and Dynamic Analysis 51
RestTestGen: An Extensible Framework for Automated Black-box Testing of RESTful APIs 49
Security testing of second order permission re-delegation vulnerabilities in Android apps 49
Toward In-Vivo Testing of Mobile Applications 48
IFRIT: Focused Testing through Deep Reinforcement Learning 46
How design notations affect the comprehension of Web applications 46
The Use of Executable FIT Tables to support Maintenance and Evolution Tasks 44
Revealing malicious remote engineering attempts on Android apps with magic numbers 44
Deep reinforcement learning for black-box testing of android apps 43
Reactive attestation: Automatic detection and reaction to software tampering attacks 42
Enhancing REST API Testing with NLP Techniques 41
Recovering structured data types from a legacy data model with overlays 41
Towards Supporting the Analysis of Online Discussions in OSS Communities: A Speech-Act Based Approach 40
Static Analysis and Penetration Testing from the Perspective of Maintenance Teams 40
NEUROPULS: NEUROmorphic energy-efficient secure accelerators based on Phase change materials aUgmented siLicon photonicS 38
Refactoring the aspectizable interfaces: an empirical assessment 37
Using acceptance tests as a support for clarifying requirements: A series of experiments 37
SOFIA: An Automated Security Oracle for Black-Box Testing of SQL-Injection Vulnerabilities 36
Assessing the security of inter-app communications in android through reinforcement learning 34
Experimental comparison of features, analyses, and classifiers for Android malware detection 34
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User-and Case-Studies on Actionable Mitigations 33
Remote Attestation of IoT Devices using Physically Unclonable Functions: Recent Advancements and Open Research Challenges 29
Totale 5.097
Categoria #
all - tutte 23.938
article - articoli 10.170
book - libri 373
conference - conferenze 13.395
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 47.876


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021320 0 0 0 38 65 106 19 9 7 16 42 18
2021/2022298 5 44 7 17 32 14 6 20 17 6 49 81
2022/2023931 66 81 109 145 84 194 46 48 112 12 24 10
2023/2024577 22 39 38 85 47 66 61 30 8 44 113 24
2024/20251.462 76 97 29 227 50 66 85 157 160 96 201 218
2025/20261.234 355 350 448 81 0 0 0 0 0 0 0 0
Totale 5.097