IANNI, MICHELE
 Distribuzione geografica
Continente #
AS - Asia 2.070
NA - Nord America 1.763
EU - Europa 833
SA - Sud America 546
AF - Africa 150
OC - Oceania 3
Continente sconosciuto - Info sul continente non disponibili 2
Totale 5.367
Nazione #
US - Stati Uniti d'America 1.689
SG - Singapore 796
BR - Brasile 385
VN - Vietnam 370
CN - Cina 363
IT - Italia 213
HK - Hong Kong 152
DE - Germania 130
FR - Francia 124
AT - Austria 88
FI - Finlandia 63
BD - Bangladesh 60
SN - Senegal 57
AR - Argentina 56
IN - India 53
UA - Ucraina 44
KR - Corea 42
EC - Ecuador 37
SE - Svezia 37
IQ - Iraq 32
CA - Canada 29
MX - Messico 29
GB - Regno Unito 28
PK - Pakistan 26
ID - Indonesia 25
ZA - Sudafrica 21
CZ - Repubblica Ceca 20
MA - Marocco 20
SA - Arabia Saudita 18
TR - Turchia 18
RU - Federazione Russa 15
VE - Venezuela 15
CO - Colombia 14
UZ - Uzbekistan 13
JP - Giappone 12
IR - Iran 11
NL - Olanda 11
PE - Perù 11
CL - Cile 10
ES - Italia 10
KE - Kenya 10
PH - Filippine 10
JO - Giordania 9
LB - Libano 8
PL - Polonia 8
PY - Paraguay 8
TN - Tunisia 7
DZ - Algeria 6
EG - Egitto 6
ET - Etiopia 6
IL - Israele 6
UY - Uruguay 6
CH - Svizzera 5
AE - Emirati Arabi Uniti 4
AZ - Azerbaigian 4
BE - Belgio 4
IE - Irlanda 4
KH - Cambogia 4
MY - Malesia 4
RO - Romania 4
SV - El Salvador 4
AM - Armenia 3
AU - Australia 3
BG - Bulgaria 3
BH - Bahrain 3
BO - Bolivia 3
HR - Croazia 3
JM - Giamaica 3
KZ - Kazakistan 3
MD - Moldavia 3
NO - Norvegia 3
NP - Nepal 3
OM - Oman 3
PS - Palestinian Territory 3
RS - Serbia 3
TW - Taiwan 3
AL - Albania 2
CR - Costa Rica 2
DO - Repubblica Dominicana 2
KG - Kirghizistan 2
LK - Sri Lanka 2
LV - Lettonia 2
MU - Mauritius 2
PA - Panama 2
TH - Thailandia 2
UG - Uganda 2
AO - Angola 1
BA - Bosnia-Erzegovina 1
BB - Barbados 1
BJ - Benin 1
BT - Bhutan 1
BY - Bielorussia 1
CI - Costa d'Avorio 1
EU - Europa 1
GA - Gabon 1
GM - Gambi 1
GY - Guiana 1
HN - Honduras 1
HU - Ungheria 1
KW - Kuwait 1
Totale 5.353
Città #
Dallas 397
Singapore 334
Chandler 223
San Jose 180
Hong Kong 141
Ashburn 127
Boardman 125
Ho Chi Minh City 110
Hanoi 96
Vienna 73
Beijing 68
Dakar 57
Lauterbourg 51
Shanghai 51
Helsinki 46
Hefei 44
Seoul 38
San Mateo 36
São Paulo 35
Munich 34
Jacksonville 26
Dhaka 25
Lawrence 25
New York 25
Roxbury 25
Brooklyn 24
Los Angeles 24
Rende 23
Strasbourg 20
Bremen 19
Catanzaro 19
Guangzhou 19
Brno 18
Dearborn 18
Haiphong 18
Rome 18
Cambridge 17
Cosenza 17
Milan 17
Quito 16
Da Nang 14
Hải Dương 13
Inglewood 13
Curitiba 12
Frankfurt am Main 12
Tashkent 12
Turku 12
Baghdad 11
Guayaquil 10
Ogden 10
Rio de Janeiro 10
Salvador 10
Amman 9
Brasília 9
Chicago 9
Florence 9
Grafing 9
Jeddah 9
London 9
Nairobi 9
Pune 8
The Dalles 8
Tokyo 8
Council Bluffs 7
Lima 7
Montreal 7
Ottawa 7
Phoenix 7
San Francisco 7
Santa Clara 7
Tianjin 7
Amsterdam 6
Asunción 6
Can Tho 6
Catania 6
Des Moines 6
Jiaxing 6
Lahore 6
Ninh Bình 6
Orem 6
Porto Alegre 6
Riyadh 6
Addis Ababa 5
Ankara 5
Cape Town 5
Chennai 5
Columbus 5
Erbil 5
Falkenstein 5
Indore 5
Johannesburg 5
Joinville 5
Karachi 5
Lappeenranta 5
Nha Trang 5
Nuremberg 5
Phủ Lý 5
Seattle 5
Stockholm 5
Thái Nguyên 5
Totale 3.126
Nome #
Distributed computing by leveraging and rewarding idling user resources from P2P networks 196
Evasion of Deep Learning Malware Detection via Adversarial Selective Obfuscation 189
A Formal Framework for LLM-assisted Automated Generation of Zeek Signatures from Binary Artifacts 186
A Peer to Peer Approach to Efficient High Performance Computing 177
Efficient high performance computing by user networks 170
Effective high performance computing using peer to peer networks 163
An overview of the endless battle between virus writers and detectors: How compilers can be used as an evasion technique 160
Activity daily living prediction with marked temporal point processes 138
An advanced data fabric architecture leveraging homomorphic encryption and federated learning 120
High Performance Computing by the Crowd 119
Clustering big data 114
Predicting activities of daily living via temporal point processes: Approaches and experimental results 106
A compact encoding of security logs for high performance activity detection 104
Special Issue on Offensive and Defensive Techniques in the Context of Man-At-The-End (MATE) Attacks 104
Demystifying machine learning models of massive IoT attack detection with Explainable AI for sustainable and secure future smart cities 101
Clustering Goes Big: CLUBS-P, an Algorithm for Unsupervised Clustering Around Centroids Tailored for Big Data Applications 100
Light sensor based covert channels on mobile devices 99
Modeling and efficiently detecting security-critical sequences of actions 99
Neural Network based Temporal Point Processes for Attack Detection in Industrial Control Systems 97
Exploiting Marked Temporal Point Processes for Predicting Activities of Daily Living 97
Exotic compilers as a malware evasion technique 97
Big data techniques for supporting accurate predictions of energy production from renewable sources 96
Explaining Binary Obfuscation 95
Computer Security. ESORICS 2023 International Workshops 94
FL-Enhance: A federated learning framework for balancing non-IID data with augmented and shared compressed samples 94
Enabling Faster Security Assessment of Re-hosted Firmware 92
A survey of Big Data dimensions vs Social Networks analysis 91
Identification and prediction of attacks to industrial control systems using temporal point processes 90
Smart Data Exchange 90
Firmware Dynamic Analysis Through Rewriting 87
Efficient big data clustering 87
A cross-architecture malware detection approach based on intermediate representation 86
Fast and effective Big Data exploration by clustering 86
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things 85
Hierarchical big data clustering 81
Activity Recognition and Prediction for Smart IoT Environments 80
SigIL: A Signature-Based Approach of Malware Detection on Intermediate Language 80
How to implement a big data clustering algorithm: A Brief Report on lesson learned 79
SCOUT: Security by computing OUTliers on activity logs 79
Editorial: Special issue on software protection and attacks 78
Enabling Obfuscation Detection in Binary Software through eXplainable AI 78
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone 77
Model aggregation techniques in federated learning: A comprehensive survey 76
Federated Learning in radiomics: A comprehensive meta-survey on medical image analysis 76
Deep Learning-Based Detection of CSRF Vulnerabilities in Web Applications 75
A Forensic Framework for Screen Capture Validation in Legal Contexts 71
Trusted environments for volunteer computing 71
Software Security - Introduction to the Special Theme 63
CheckMATE’24 Chairs’ Welcome 63
VIPOC project research summary (discussion paper) 63
Some experiments on activity outlier detection 62
Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts 56
Trusted Volunteer Computing 55
Exploiting number theory for dynamic software watermarking 54
Some Experiments on High Performance Anomaly Detection 52
Security and privacy for the Internet of Things 49
Identification and prediction of attacks to industrial control systems using temporal point processes 32
CheckMATE '25: Research on Offensive and Defensive Techniques in the Context of Man At The End (MATE) Attacks 10
Totale 5.469
Categoria #
all - tutte 29.998
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 29.998


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202111 0 0 0 0 0 0 0 0 0 6 0 5
2021/2022251 0 2 2 24 6 11 0 61 2 0 42 101
2022/2023501 55 63 30 66 72 51 4 83 30 13 21 13
2023/2024520 58 29 77 29 34 36 30 46 25 31 19 106
2024/20251.091 99 103 49 77 63 48 64 37 154 34 103 260
2025/20262.953 333 295 357 263 572 251 325 154 156 247 0 0
Totale 5.469