IANNI, Michele
 Distribuzione geografica
Continente #
AS - Asia 1.713
NA - Nord America 1.485
EU - Europa 710
SA - Sud America 413
AF - Africa 111
OC - Oceania 3
Continente sconosciuto - Info sul continente non disponibili 1
Totale 4.436
Nazione #
US - Stati Uniti d'America 1.433
SG - Singapore 749
CN - Cina 335
BR - Brasile 308
VN - Vietnam 235
IT - Italia 203
HK - Hong Kong 138
DE - Germania 124
AT - Austria 88
FI - Finlandia 60
FR - Francia 57
SN - Senegal 56
BD - Bangladesh 47
KR - Corea 42
UA - Ucraina 38
AR - Argentina 37
SE - Svezia 37
CA - Canada 28
EC - Ecuador 27
GB - Regno Unito 25
IN - India 21
CZ - Repubblica Ceca 20
IQ - Iraq 20
ID - Indonesia 16
MX - Messico 15
PK - Pakistan 15
SA - Arabia Saudita 14
MA - Marocco 13
ZA - Sudafrica 12
IR - Iran 11
JP - Giappone 11
RU - Federazione Russa 10
ES - Italia 9
KE - Kenya 9
NL - Olanda 9
TR - Turchia 9
CO - Colombia 8
LB - Libano 8
PE - Perù 8
VE - Venezuela 8
CL - Cile 6
PL - Polonia 6
JO - Giordania 5
PY - Paraguay 5
UY - Uruguay 5
UZ - Uzbekistan 5
BE - Belgio 4
IL - Israele 4
AM - Armenia 3
AU - Australia 3
AZ - Azerbaigian 3
DZ - Algeria 3
EG - Egitto 3
IE - Irlanda 3
KH - Cambogia 3
KZ - Kazakistan 3
NO - Norvegia 3
RO - Romania 3
TN - Tunisia 3
BG - Bulgaria 2
CH - Svizzera 2
DO - Repubblica Dominicana 2
ET - Etiopia 2
KG - Kirghizistan 2
LK - Sri Lanka 2
OM - Oman 2
PA - Panama 2
PS - Palestinian Territory 2
RS - Serbia 2
SV - El Salvador 2
TW - Taiwan 2
UG - Uganda 2
AE - Emirati Arabi Uniti 1
AL - Albania 1
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
BJ - Benin 1
BO - Bolivia 1
CI - Costa d'Avorio 1
CR - Costa Rica 1
EU - Europa 1
HN - Honduras 1
HU - Ungheria 1
LV - Lettonia 1
MG - Madagascar 1
ML - Mali 1
MN - Mongolia 1
MR - Mauritania 1
MY - Malesia 1
NG - Nigeria 1
NP - Nepal 1
PT - Portogallo 1
SI - Slovenia 1
TG - Togo 1
TH - Thailandia 1
Totale 4.436
Città #
Dallas 395
Singapore 302
Chandler 223
Hong Kong 130
Boardman 125
Ashburn 84
Ho Chi Minh City 73
Vienna 73
Beijing 63
Hanoi 62
Dakar 56
Shanghai 50
Helsinki 45
Hefei 44
Seoul 38
San Mateo 36
Munich 34
São Paulo 28
Jacksonville 26
Lawrence 25
Roxbury 25
Dhaka 24
Brooklyn 23
New York 23
Rende 23
Los Angeles 21
Strasbourg 20
Bremen 19
Catanzaro 19
Brno 18
Dearborn 18
Rome 18
Cambridge 17
Cosenza 17
Milan 14
Inglewood 13
Guangzhou 12
Turku 12
Haiphong 11
Hải Dương 11
Frankfurt am Main 10
Ogden 10
Rio de Janeiro 10
Chicago 9
Da Nang 9
Florence 9
Grafing 9
Guayaquil 9
Quito 9
Curitiba 8
Jeddah 8
London 8
Nairobi 8
The Dalles 8
Tokyo 8
Brasília 7
Lima 7
Montreal 7
Ottawa 7
Pune 7
Salvador 7
San Francisco 7
Santa Clara 7
Tianjin 7
Baghdad 6
Catania 6
Council Bluffs 6
Des Moines 6
Jiaxing 6
Ninh Bình 6
Phoenix 6
Amman 5
Amsterdam 5
Can Tho 5
Columbus 5
Erbil 5
Johannesburg 5
Riyadh 5
San Jose 5
Seattle 5
Stockholm 5
Wuhan 5
Ankara 4
Asunción 4
Beirut 4
Brussels 4
Charlotte 4
Chennai 4
Denver 4
Falkenstein 4
Nuremberg 4
Porto Alegre 4
Richmond 4
Secaucus 4
Tashkent 4
Thái Nguyên 4
Toronto 4
Volta Redonda 4
Warsaw 4
West Jordan 4
Totale 2.634
Nome #
Evasion of Deep Learning Malware Detection via Adversarial Selective Obfuscation 173
A Formal Framework for LLM-assisted Automated Generation of Zeek Signatures from Binary Artifacts 172
Distributed computing by leveraging and rewarding idling user resources from P2P networks 153
Efficient high performance computing by user networks 140
An overview of the endless battle between virus writers and detectors: How compilers can be used as an evasion technique 137
A Peer to Peer Approach to Efficient High Performance Computing 135
Effective high performance computing using peer to peer networks 133
Activity daily living prediction with marked temporal point processes 126
An advanced data fabric architecture leveraging homomorphic encryption and federated learning 103
Clustering big data 98
Predicting activities of daily living via temporal point processes: Approaches and experimental results 96
High Performance Computing by the Crowd 96
Special Issue on Offensive and Defensive Techniques in the Context of Man-At-The-End (MATE) Attacks 95
Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities 90
Modeling and efficiently detecting security-critical sequences of actions 86
Light sensor based covert channels on mobile devices 85
Big data techniques for supporting accurate predictions of energy production from renewable sources 85
Exotic compilers as a malware evasion technique 85
A compact encoding of security logs for high performance activity detection 85
Clustering Goes Big: CLUBS-P, an Algorithm for Unsupervised Clustering Around Centroids Tailored for Big Data Applications 84
Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living 83
Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems 80
Explaining Binary Obfuscation 79
FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples 79
Fast and effective Big Data exploration by clustering 78
Computer Security. ESORICS 2023 International Workshops 76
Enabling Faster Security Assessment of Re-hosted Firmware 75
Smart Data Exchange 75
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things 74
Efficient big data clustering 72
Editorial: Special issue on software protection and attacks 69
Identification and prediction of attacks to industrial control systems using temporal point processes 69
Model aggregation techniques in federated learning: A comprehensive survey 68
A survey of Big Data dimensions vs Social Networks analysis 67
Hierarchical big data clustering 66
SCOUT: Security by computing OUTliers on activity logs 66
Activity Recognition and Prediction for Smart IoT Environments 64
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language 64
A cross-architecture malware detection approach based on intermediate representation 64
Firmware Dynamic Analysis Through Rewriting 63
How to implement a big data clustering algorithm: A Brief Report on lesson learned 62
Enabling Obfuscation Detection in Binary Software through eXplainable AI 60
A Forensic Framework for Screen Capture Validation in Legal Contexts 57
Federated Learning in radiomics: A comprehensive meta-survey on medical image analysis 57
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications 57
Trusted environments for volunteer computing 57
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone 56
VIPOC project research summary (discussion paper) 55
Software Security - Introduction to the Special Theme 50
CheckMATE’24 Chairs’ Welcome 50
Some experiments on activity outlier detection 49
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts 46
Some Experiments on High Performance Anomaly Detection 43
Security and privacy for the Internet of Things 43
Exploiting number theory for dynamic software watermarking 41
Trusted Volunteer Computing 41
Identification and prediction of attacks to industrial control systems using temporal point processes 25
Totale 4.537
Categoria #
all - tutte 28.415
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 28.415


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202137 0 0 0 0 0 7 3 10 6 6 0 5
2021/2022251 0 2 2 24 6 11 0 61 2 0 42 101
2022/2023501 55 63 30 66 72 51 4 83 30 13 21 13
2023/2024520 58 29 77 29 34 36 30 46 25 31 19 106
2024/20251.091 99 103 49 77 63 48 64 37 154 34 103 260
2025/20262.021 333 295 357 263 572 201 0 0 0 0 0 0
Totale 4.537