IANNI, Michele
 Distribuzione geografica
Continente #
AS - Asia 1.613
NA - Nord America 1.473
EU - Europa 700
SA - Sud America 400
AF - Africa 105
OC - Oceania 3
Continente sconosciuto - Info sul continente non disponibili 1
Totale 4.295
Nazione #
US - Stati Uniti d'America 1.422
SG - Singapore 680
CN - Cina 331
BR - Brasile 299
VN - Vietnam 213
IT - Italia 196
HK - Hong Kong 138
DE - Germania 124
AT - Austria 88
FI - Finlandia 60
FR - Francia 57
SN - Senegal 56
BD - Bangladesh 47
KR - Corea 42
UA - Ucraina 38
SE - Svezia 37
AR - Argentina 36
CA - Canada 28
EC - Ecuador 26
GB - Regno Unito 25
CZ - Repubblica Ceca 20
IN - India 20
IQ - Iraq 17
ID - Indonesia 15
MX - Messico 15
PK - Pakistan 15
SA - Arabia Saudita 14
MA - Marocco 13
IR - Iran 11
JP - Giappone 11
ZA - Sudafrica 10
ES - Italia 9
RU - Federazione Russa 9
TR - Turchia 9
CO - Colombia 8
LB - Libano 8
NL - Olanda 8
PE - Perù 8
CL - Cile 6
KE - Kenya 6
PL - Polonia 6
VE - Venezuela 6
JO - Giordania 5
PY - Paraguay 5
UY - Uruguay 5
UZ - Uzbekistan 5
BE - Belgio 4
IL - Israele 4
AM - Armenia 3
AU - Australia 3
AZ - Azerbaigian 3
EG - Egitto 3
IE - Irlanda 3
KH - Cambogia 3
KZ - Kazakistan 3
NO - Norvegia 3
RO - Romania 3
TN - Tunisia 3
BG - Bulgaria 2
CH - Svizzera 2
DZ - Algeria 2
ET - Etiopia 2
KG - Kirghizistan 2
LK - Sri Lanka 2
OM - Oman 2
PA - Panama 2
PS - Palestinian Territory 2
SV - El Salvador 2
TW - Taiwan 2
UG - Uganda 2
AE - Emirati Arabi Uniti 1
AL - Albania 1
AO - Angola 1
BB - Barbados 1
BH - Bahrain 1
BJ - Benin 1
BO - Bolivia 1
CI - Costa d'Avorio 1
CR - Costa Rica 1
DO - Repubblica Dominicana 1
EU - Europa 1
HN - Honduras 1
HU - Ungheria 1
LV - Lettonia 1
MG - Madagascar 1
ML - Mali 1
MN - Mongolia 1
MR - Mauritania 1
MY - Malesia 1
NG - Nigeria 1
NP - Nepal 1
PT - Portogallo 1
RS - Serbia 1
SI - Slovenia 1
TG - Togo 1
TH - Thailandia 1
Totale 4.295
Città #
Dallas 395
Singapore 284
Chandler 223
Hong Kong 130
Boardman 124
Ashburn 80
Vienna 73
Ho Chi Minh City 68
Beijing 63
Dakar 56
Hanoi 52
Shanghai 50
Helsinki 45
Hefei 44
Seoul 38
San Mateo 36
Munich 34
São Paulo 28
Jacksonville 26
Lawrence 25
Roxbury 25
Dhaka 24
Brooklyn 23
New York 23
Rende 23
Los Angeles 21
Strasbourg 20
Bremen 19
Catanzaro 19
Brno 18
Dearborn 18
Rome 18
Cambridge 17
Cosenza 17
Inglewood 13
Milan 13
Guangzhou 12
Turku 12
Hải Dương 11
Frankfurt am Main 10
Ogden 10
Rio de Janeiro 10
Chicago 9
Da Nang 9
Florence 9
Grafing 9
Haiphong 9
Quito 9
Curitiba 8
Guayaquil 8
Jeddah 8
London 8
The Dalles 8
Tokyo 8
Brasília 7
Lima 7
Montreal 7
Ottawa 7
Pune 7
Salvador 7
San Francisco 7
Santa Clara 7
Council Bluffs 6
Des Moines 6
Jiaxing 6
Phoenix 6
Amman 5
Amsterdam 5
Baghdad 5
Can Tho 5
Catania 5
Columbus 5
Erbil 5
Nairobi 5
Ninh Bình 5
Riyadh 5
Seattle 5
Stockholm 5
Tianjin 5
Wuhan 5
Ankara 4
Asunción 4
Beirut 4
Brussels 4
Charlotte 4
Denver 4
Falkenstein 4
Johannesburg 4
Nuremberg 4
Porto Alegre 4
Richmond 4
Secaucus 4
Tashkent 4
Thái Nguyên 4
Toronto 4
Volta Redonda 4
Warsaw 4
West Jordan 4
Araras 3
Araçatuba 3
Totale 2.580
Nome #
Evasion of Deep Learning Malware Detection via Adversarial Selective Obfuscation 168
A Formal Framework for LLM-assisted Automated Generation of Zeek Signatures from Binary Artifacts 168
Distributed computing by leveraging and rewarding idling user resources from P2P networks 148
Efficient high performance computing by user networks 136
An overview of the endless battle between virus writers and detectors: How compilers can be used as an evasion technique 132
Effective high performance computing using peer to peer networks 131
A Peer to Peer Approach to Efficient High Performance Computing 130
Activity daily living prediction with marked temporal point processes 124
An advanced data fabric architecture leveraging homomorphic encryption and federated learning 100
Clustering big data 96
Special Issue on Offensive and Defensive Techniques in the Context of Man-At-The-End (MATE) Attacks 95
Predicting activities of daily living via temporal point processes: Approaches and experimental results 94
High Performance Computing by the Crowd 93
Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities 88
Modeling and efficiently detecting security-critical sequences of actions 85
Exotic compilers as a malware evasion technique 85
Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living 83
A compact encoding of security logs for high performance activity detection 83
Light sensor based covert channels on mobile devices 82
Big data techniques for supporting accurate predictions of energy production from renewable sources 81
Clustering Goes Big: CLUBS-P, an Algorithm for Unsupervised Clustering Around Centroids Tailored for Big Data Applications 81
FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples 78
Fast and effective Big Data exploration by clustering 78
Explaining Binary Obfuscation 74
Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems 74
Smart Data Exchange 74
Computer Security. ESORICS 2023 International Workshops 73
Enabling Faster Security Assessment of Re-hosted Firmware 71
Efficient big data clustering 71
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things 70
Model aggregation techniques in federated learning: A comprehensive survey 68
Hierarchical big data clustering 66
Editorial: Special issue on software protection and attacks 65
A survey of Big Data dimensions vs Social Networks analysis 64
SCOUT: Security by computing OUTliers on activity logs 63
Identification and prediction of attacks to industrial control systems using temporal point processes 62
How to implement a big data clustering algorithm: A Brief Report on lesson learned 62
Activity Recognition and Prediction for Smart IoT Environments 60
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language 60
A cross-architecture malware detection approach based on intermediate representation 59
Firmware Dynamic Analysis Through Rewriting 58
Trusted environments for volunteer computing 57
Federated Learning in radiomics: A comprehensive meta-survey on medical image analysis 56
Enabling Obfuscation Detection in Binary Software through eXplainable AI 56
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone 55
VIPOC project research summary (discussion paper) 55
A Forensic Framework for Screen Capture Validation in Legal Contexts 54
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications 53
Software Security - Introduction to the Special Theme 47
CheckMATE’24 Chairs’ Welcome 47
Some experiments on activity outlier detection 47
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts 45
Some Experiments on High Performance Anomaly Detection 43
Security and privacy for the Internet of Things 43
Trusted Volunteer Computing 41
Exploiting number theory for dynamic software watermarking 40
Identification and prediction of attacks to industrial control systems using temporal point processes 24
Totale 4.396
Categoria #
all - tutte 27.984
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 27.984


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202137 0 0 0 0 0 7 3 10 6 6 0 5
2021/2022251 0 2 2 24 6 11 0 61 2 0 42 101
2022/2023501 55 63 30 66 72 51 4 83 30 13 21 13
2023/2024520 58 29 77 29 34 36 30 46 25 31 19 106
2024/20251.091 99 103 49 77 63 48 64 37 154 34 103 260
2025/20261.880 333 295 357 263 572 60 0 0 0 0 0 0
Totale 4.396