Massacci, Fabio
 Distribuzione geografica
Continente #
NA - Nord America 23.241
AS - Asia 8.227
EU - Europa 6.653
SA - Sud America 1.579
AF - Africa 164
OC - Oceania 28
Continente sconosciuto - Info sul continente non disponibili 11
Totale 39.903
Nazione #
US - Stati Uniti d'America 22.411
SG - Singapore 3.389
CN - Cina 1.578
VN - Vietnam 1.516
BR - Brasile 1.279
GB - Regno Unito 905
RU - Federazione Russa 892
DE - Germania 881
IT - Italia 841
UA - Ucraina 727
CA - Canada 701
SE - Svezia 573
FI - Finlandia 530
KR - Corea 495
FR - Francia 379
LV - Lettonia 328
IN - India 225
HK - Hong Kong 179
BG - Bulgaria 164
ID - Indonesia 137
AR - Argentina 117
TR - Turchia 112
BD - Bangladesh 94
MX - Messico 90
IQ - Iraq 82
NL - Olanda 82
JP - Giappone 79
JO - Giordania 66
PL - Polonia 64
EC - Ecuador 56
ES - Italia 56
ZA - Sudafrica 54
AT - Austria 52
PK - Pakistan 39
CO - Colombia 34
NO - Norvegia 30
LT - Lituania 27
PY - Paraguay 27
UZ - Uzbekistan 27
MA - Marocco 25
AU - Australia 23
PH - Filippine 23
TW - Taiwan 22
AE - Emirati Arabi Uniti 19
CL - Cile 19
AZ - Azerbaigian 17
DZ - Algeria 16
VE - Venezuela 16
SA - Arabia Saudita 15
BE - Belgio 13
EG - Egitto 13
PE - Perù 13
CZ - Repubblica Ceca 12
LB - Libano 12
MY - Malesia 12
TH - Thailandia 12
UY - Uruguay 12
AL - Albania 11
CH - Svizzera 11
IE - Irlanda 10
TN - Tunisia 10
ET - Etiopia 9
GR - Grecia 9
KE - Kenya 9
GE - Georgia 8
IR - Iran 8
KZ - Kazakistan 8
BY - Bielorussia 7
IL - Israele 7
PT - Portogallo 7
RS - Serbia 7
BO - Bolivia 6
CR - Costa Rica 6
DK - Danimarca 6
DO - Repubblica Dominicana 6
EU - Europa 6
JM - Giamaica 6
LK - Sri Lanka 6
RO - Romania 6
SN - Senegal 6
CI - Costa d'Avorio 5
HN - Honduras 5
HU - Ungheria 5
LU - Lussemburgo 5
PA - Panama 5
PS - Palestinian Territory 5
QA - Qatar 5
BH - Bahrain 4
KG - Kirghizistan 4
NP - Nepal 4
NZ - Nuova Zelanda 4
OM - Oman 4
SK - Slovacchia (Repubblica Slovacca) 4
TT - Trinidad e Tobago 4
A2 - ???statistics.table.value.countryCode.A2??? 3
BN - Brunei Darussalam 3
EE - Estonia 3
HR - Croazia 3
NG - Nigeria 3
NI - Nicaragua 3
Totale 39.868
Città #
Fairfield 2.331
Singapore 2.237
Ashburn 2.216
Chandler 1.716
Jacksonville 1.530
Woodbridge 1.016
Seattle 984
Wilmington 982
Houston 893
Dallas 849
San Jose 842
Cambridge 725
Ann Arbor 644
Santa Clara 640
Columbus 595
Montréal 554
Ho Chi Minh City 474
Munich 463
San Mateo 462
Princeton 439
Mcallen 400
Beijing 386
Moscow 385
Seoul 381
Hanoi 328
Riga 328
Los Angeles 294
New York 292
Lauterbourg 285
The Dalles 261
Trento 247
Helsinki 190
Chicago 173
San Diego 165
Sofia 160
Dearborn 151
Hong Kong 148
Buffalo 145
Council Bluffs 143
Boardman 127
Hefei 127
Lawrence 116
London 115
São Paulo 115
Orem 113
Da Nang 105
Jakarta 79
Lappeenranta 77
Haiphong 73
Tokyo 72
Milan 68
Düsseldorf 64
Falls Church 63
Salt Lake City 62
Izmir 61
Redondo Beach 59
Toronto 56
Chennai 55
Warsaw 54
Rome 51
San Paolo di Civitate 51
Phoenix 47
Amsterdam 46
Frankfurt am Main 44
Norwalk 42
Rio de Janeiro 41
Brooklyn 40
Guangzhou 40
Turku 40
Denver 39
Koblenz 39
Montreal 39
North Bergen 37
Vienna 36
Tampa 34
Elk Grove Village 33
Padova 33
Atlanta 32
Washington 32
Hải Dương 31
Belo Horizonte 30
Johannesburg 30
Manchester 30
Kilburn 29
Poplar 29
Stockholm 29
Mexico City 28
Rådal 28
Verona 28
Brasília 27
Tashkent 26
Nuremberg 25
Andover 24
Baghdad 23
Shanghai 23
Des Moines 22
Dhaka 21
Falkenstein 21
Quito 21
Mumbai 20
Totale 28.456
Nome #
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring 584
How CVSS is DOSsing your patching policy (and wasting your money) 567
Attack potential in impact & complexity 535
The Work-Averse Attacker Model 518
An automatic method for assessing the versions affected by a vulnerability 495
Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training 237
Then and Now: On the Maturity of the Cybercrime Markets the Lesson That Black-Hat Marketeers Learned 233
A Dynamic Security Framework for Ambient Intelligent Systems: A smart-Home Based eHealth Application 229
Runtime Enforcement of Security Policies on Black Box Reactive Programs 229
A relative cost-benefit approach for evaluating alternative airport security policies 226
A Qualitative Study of Dependency Management and Its Security Implications 220
Security Events and Vulnerability Data for Cybersecurity Risk Estimation 211
Action, Inaction, Trust, and Cybersecurity's Common Property Problem 205
A method for security governance, risk, and compliance (GRC): A goal-process approach 203
A Screening Test for Disclosed Vulnerabilities in FOSS Components 200
On the feasibility of detecting injections in malicious npm packages 197
MULTI-CONTEXT EXPLOIT TEST MANAGEMENT 189
Model Comprehension for Security Risk Assessment: An Empirical Comparison of Tabular vs. Graphical Representations 189
Economic Impacts of Rules-versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers 188
Vuln4Real: A Methodology for Counting Actually Vulnerable Dependencies 188
Engineering Secure Future Internet Services 180
A negotiation scheme for access rights establishment in autonomic communication 179
A preliminary analysis of vulnerability scores for attacks in wild: The EKITS and SYM datasets 178
FuturesMEX: Secure, Distributed Futures Market Exchange 178
A Load Time Policy Checker for Open Multi-application Smart Cards 177
From Trust to Dependability through Risk Analysis 175
On the equivalence between graphical and tabular representations for security risk assessment 175
Security and Trust in IT Business Outsourcing: a Manifesto 174
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 174
A Model-Driven Approach for the Specification and Analysis of Access Control Policies 173
An approach for decision support on the uncertainty in feature model evolution 171
Security in the Firefox OS and Tizen mobile platforms 170
Governance Challenges for European Cybersecurity Policies: Stakeholder Views 170
An Experimental Comparison of Two Risk-Based Security Methods 168
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners 167
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates 167
Non-monotonic Security Protocols and Failures in Financial Intermediation 167
Towards Using Source Code Repositories to Identify Software Supply Chain Attacks 167
Typosquatting and Combosquatting Attacks on the Python Ecosystem. 165
On the security cost of using a free and open source component in a proprietary product 164
Computer Aided Threat Identification 163
Crime pays if you are just an average hacker 163
An empirical study of the technology transfer potential of EU security and trust R&D projects 162
An Interactive Trust Management and Negotiation Scheme 162
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications 162
EMFASE - An empirical framework for security design and economic trade-off 161
Evaluation of airport security training programs: Perspectives and issues 161
Interactive credential negotiation for stateful business processes 160
Blockchain-based Invoice Factoring: from business requirements to commitments 160
Generalized XML Security Views 159
An experiment on comparing textual vs. visual industrial methods for security risk assessment 159
A Tool for Managing Evolving Security Requirements 158
Planning attacks to security protocols: case studies in logic programming 157
Interactive Access Control for Web Services 156
Which Security Catalogue Is Better for Novices? 156
LastPyMile: Identifying the discrepancy between sources and packages 156
A survey of autonomic communications 155
A Flexible Security Architecture to Support Third-party Applications on Mobile Devices. 155
An Idea of an Independent Validation of Vulnerability Discovery Models 155
Security-by-Contract for the OSGi platform 155
Towards black box testing of android apps 155
A Protocol’s Life After Attacks 154
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques 154
Comparing vulnerability severity and exploits using case-control studies 153
Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools 153
TestREx: a framework for repeatable exploits 153
An empirical methodology to evaluate vulnerability discovery models 151
E Pluribus Unum: Deduction, Abduction and Induction, the Reasoning Services for Access Control in Autonomic Communication 151
Load time code validation for mobile phone Java Cards 151
Preliminary Findings on FOSS Dependencies and Security : A Qualitative Study on Developers' Attitudes and Experience 151
Load Time Security Verification 150
The role of catalogues of threats and security controls in security risk assessment: An empirical study with ATM professionals 150
Managing changes with legacy security engineering processes 149
Designing Security Requirements Models through Planning 149
An Extended Ontology for Security Requirements 149
Empirical Assessment of Security Requirements and Architecture: Lessons Learned 149
Affordable security or big guy vs small guy: Does the depth of your pockets impact your protocols? 149
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures 148
Security-by-contract for the future internet 148
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain 148
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags 146
A System for Interactive Authorization for Business Processes for Web Services 144
StaDynA: Addressing the problem of dynamic code updates in the security analysis of android applications 144
Security of the OSGi platform 143
A Privacy Model to Support Minimal Disclosure in Virtual Organizations 143
Security requirements engineering: The si*modeling language and the Secure Tropos methodology 143
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes 143
IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation 143
Supporting software evolution for open smart cards by security-by-contract 142
An Independent Validation of Vulnerability Discovery Models 142
Secure and Dependable Patterns in Organizations: An Empirical Approach 141
An Algorithm for the Appraisal of Assurance Indicators for Complex Business Processes 140
Teaching predictive modeling to junior software engineers - Seminar format and its evaluation 140
Tableaux and Algorithms for Propositional Dynamic Logic with Converse 139
Hierarchical Hippocratic Databases with Minimal Disclosure for Virtual Organizations 139
Can we support applications' evolution in multi-application smart cards by security-by-contract? 139
Reactive non-interference for a browser model 139
Organizational Patterns for Security and Dependability: From Design to Application. 139
Cyber insurance and time-to-compromise: An integrated approach 139
Satisfaction of control objectives by control processes 137
Totale 18.297
Categoria #
all - tutte 161.724
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 676
selected - selezionate 0
volume - volumi 9.342
Totale 171.742


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021958 0 0 0 0 0 0 0 0 0 256 456 246
2021/20223.202 145 631 37 170 73 85 163 602 179 232 296 589
2022/20233.517 472 418 40 485 382 561 18 282 532 49 183 95
2023/20241.631 100 142 94 86 148 355 106 96 21 200 71 212
2024/20255.682 20 28 362 1.127 315 830 92 303 414 982 498 711
2025/202613.115 1.044 393 1.950 2.401 1.571 966 2.334 410 1.152 894 0 0
Totale 40.413