Massacci, Fabio
 Distribuzione geografica
Continente #
NA - Nord America 16.322
EU - Europa 3.940
AS - Asia 1.163
SA - Sud America 13
Continente sconosciuto - Info sul continente non disponibili 10
OC - Oceania 7
AF - Africa 6
Totale 21.461
Nazione #
US - Stati Uniti d'America 15.732
GB - Regno Unito 723
UA - Ucraina 708
DE - Germania 623
IT - Italia 599
CA - Canada 582
SE - Svezia 538
SG - Singapore 497
FI - Finlandia 410
CN - Cina 332
BG - Bulgaria 162
KR - Corea 110
TR - Turchia 63
JO - Giordania 56
RU - Federazione Russa 45
VN - Vietnam 37
FR - Francia 26
IN - India 26
AT - Austria 24
NL - Olanda 23
GR - Grecia 8
ID - Indonesia 7
IR - Iran 7
AU - Australia 6
BR - Brasile 6
CH - Svizzera 6
EU - Europa 6
PK - Pakistan 6
HU - Ungheria 5
BE - Belgio 4
BY - Bielorussia 4
JP - Giappone 4
LU - Lussemburgo 4
MX - Messico 4
PA - Panama 4
PH - Filippine 4
A2 - ???statistics.table.value.countryCode.A2??? 3
AE - Emirati Arabi Uniti 3
CZ - Repubblica Ceca 3
ES - Italia 3
GE - Georgia 3
IE - Irlanda 3
PL - Polonia 3
PT - Portogallo 3
RO - Romania 3
AL - Albania 2
CL - Cile 2
DK - Danimarca 2
IL - Israele 2
PE - Perù 2
SK - Slovacchia (Repubblica Slovacca) 2
TW - Taiwan 2
A1 - Anonimo 1
AR - Argentina 1
AZ - Azerbaigian 1
BO - Bolivia 1
EC - Ecuador 1
EE - Estonia 1
EG - Egitto 1
HK - Hong Kong 1
LV - Lettonia 1
MA - Marocco 1
MU - Mauritius 1
MY - Malesia 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
PS - Palestinian Territory 1
RS - Serbia 1
SC - Seychelles 1
SN - Senegal 1
ZA - Sudafrica 1
Totale 21.461
Città #
Fairfield 2.330
Chandler 1.716
Jacksonville 1.526
Ashburn 1.175
Woodbridge 1.016
Seattle 974
Wilmington 973
Houston 866
Cambridge 725
Ann Arbor 644
Montréal 554
San Mateo 462
Princeton 439
Mcallen 400
Singapore 353
Munich 344
Trento 234
San Diego 165
Sofia 160
Beijing 154
New York 152
Dearborn 151
Helsinki 116
Lawrence 116
Boardman 112
London 77
Lappeenranta 71
Düsseldorf 64
Falls Church 63
Izmir 59
San Paolo di Civitate 51
Norwalk 42
Padova 33
Washington 31
Kilburn 29
Los Angeles 27
Koblenz 26
Andover 24
Dallas 24
Hefei 24
Vienna 24
Milan 21
Toronto 20
Udine 20
Des Moines 19
Como 18
Kunming 18
Nanjing 18
Rome 17
Verona 17
Dong Ket 15
Altamura 13
Jinan 13
Guangzhou 12
Hanover 12
Shanghai 11
Costa Mesa 10
Nanchang 10
Trieste 10
Hounslow 9
Phoenix 9
San Jose 9
Bassano del Grappa 8
Frankfurt am Main 8
Leawood 8
North Bergen 8
Ottawa 8
Augusta 7
Hamburg 7
Monmouth Junction 7
Prescot 7
Shenyang 7
Acton 6
Chicago 6
Council Bluffs 6
Karlsruhe 6
Kretz 6
Lavis 6
New Bedfont 6
Wuhan 6
Zhengzhou 6
Birmensdorf 5
Bonndorf 5
Chiswick 5
Eindhoven 5
Münstermaifeld 5
Santa Clara 5
Ardabil 4
Bekasi 4
Bologna 4
Brooklyn 4
Comabbio 4
Fort Worth 4
Fremont 4
Hangzhou 4
Hebei 4
Islington 4
Mannheim 4
Nuremberg 4
Old Bridge 4
Totale 17.038
Nome #
Attack potential in impact & complexity 502
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring 494
How CVSS is DOSsing your patching policy (and wasting your money) 492
The Work-Averse Attacker Model 458
An automatic method for assessing the versions affected by a vulnerability 318
Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training 191
A Dynamic Security Framework for Ambient Intelligent Systems: A smart-Home Based eHealth Application 169
Then and now: on the maturity of the cybercrime markets: the lesson that black-hat marketeers learned 161
Runtime Enforcement of Security Policies on Black Box Reactive Programs 160
Security Events and Vulnerability Data for Cybersecurity Risk Estimation 152
Economic Impacts of Rules-versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers 143
Action, Inaction, Trust, and Cybersecurity's Common Property Problem 143
Model Comprehension for Security Risk Assessment: An Empirical Comparison of Tabular vs. Graphical Representations 136
Engineering Secure Future Internet Services 136
A Screening Test for Disclosed Vulnerabilities in FOSS Components 129
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild 115
A negotiation scheme for access rights establishment in autonomic communication 114
A relative cost-benefit approach for evaluating alternative airport security policies 112
An Interactive Trust Management and Negotiation Scheme 111
A Protocol’s Life After Attacks 107
A method for security governance, risk, and compliance (GRC): A goal-process approach 107
Interactive credential negotiation for stateful business processes 105
An Extended Ontology for Security Requirements 105
Governance Challenges for European CyberSecurity Policies: Stakeholders Views 105
An approach for decision support on the uncertainty in feature model evolution 104
An Idea of an Independent Validation of Vulnerability Discovery Models 104
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners 104
Load time code validation for mobile phone Java Cards 103
Which Security Catalogue Is Better for Novices? 103
On the equivalence between graphical and tabular representations for security risk assessment 103
Computer Aided Threat Identification 102
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications 102
Load Time Security Verification 102
Crime pays if you are just an average hacker 101
MULTI-CONTEXT EXPLOIT TEST MANAGEMENT 100
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 100
An empirical study of the technology transfer potential of EU security and trust R&D projects 99
Tableaux and Algorithms for Propositional Dynamic Logic with Converse 99
An experiment on comparing textual vs. visual industrial methods for security risk assessment 99
EMFASE - An empirical framework for security design and economic trade-off 98
Interactive Access Control for Web Services 98
Security requirements engineering: The si*modeling language and the Secure Tropos methodology 98
A Tool for Managing Evolving Security Requirements 97
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates 97
A survey of autonomic communications 96
Can we support applications' evolution in multi-application smart cards by security-by-contract? 96
Satisfaction of control objectives by control processes 96
Managing changes with legacy security engineering processes 95
An empirical methodology to evaluate vulnerability discovery models 95
Security in the Firefox OS and Tizen mobile platforms 95
IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation 95
A Model-Driven Approach for the Specification and Analysis of Access Control Policies 94
SecureChange: Security engineering for lifelong evolvable systems 94
An Experimental Comparison of Two Risk-Based Security Methods 94
TestREx: a framework for repeatable exploits 94
An Executable Specification Language for Planning Attacks to Security Protocols 93
Security and Trust in IT Business Outsourcing: a Manifesto 93
Evaluation of airport security training programs: Perspectives and issues 93
Empirical Assessment of Security Requirements and Architecture: Lessons Learned 93
From Hippocratic Databases to Secure Tropos: A Computer-Aided Re-engineering Approach 92
Security views for outsourced business processes 91
An Algorithm for the Appraisal of Assurance Indicators for Complex Business Processes 91
Security-by-contract for the future internet 91
Security-by-Contract for the OSGi platform 91
The role of catalogues of threats and security controls in security risk assessment: An empirical study with ATM professionals 91
FuturesMEX: Secure, Distributed Futures Market Exchange 91
From Trust to Dependability through Risk Analysis 90
A System for Interactive Authorization for Business Processes for Web Services 90
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System 90
Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools 90
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain 90
Blockchain-based Invoice Factoring: from business requirements to commitments 89
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques 89
Comparing vulnerability severity and exploits using case-control studies 88
A uniform tableaux method for nonmonotonic modal logics 88
An Access Control Framework for Business Processes for Web Services 88
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes 88
Breaking security protocols as an AI planning problem 87
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language 87
A Flexible Security Architecture to Support Third-party Applications on Mobile Devices. 87
Reactive non-interference for a browser model 87
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes 87
Guest Editorial: Special Section on Software Reliability and Security 87
SeCMER: A Tool to Gain Control of Security Requirements Evolution 87
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags 87
Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution 87
A Tool for Managing Evolving Security Requirements 86
From Early Requirements Analysis towards Secure Workflows 85
ST-Tool: a case tool for modeling and analyzing trust requirements 85
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures 85
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns 85
Predictability of Enforcement 85
E Pluribus Unum: Deduction, Abduction and Induction, the Reasoning Services for Access Control in Autonomic Communication 84
An overview of the verification of SET 84
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. 84
An Independent Validation of Vulnerability Discovery Models 84
Teaching predictive modeling to junior software engineers - Seminar format and its evaluation 84
Supporting software evolution for open smart cards by security-by-contract 83
Secure and Dependable Patterns in Organizations: An Empirical Approach 83
Modelling of quality of protection in outsourced business processes 83
Totale 11.775
Categoria #
all - tutte 105.179
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 390
selected - selezionate 0
volume - volumi 6.289
Totale 111.858


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20204.609 0 0 490 564 690 437 641 410 609 284 215 269
2020/20213.581 141 364 107 498 383 308 319 183 320 256 456 246
2021/20223.202 145 631 37 170 73 85 163 602 179 232 296 589
2022/20233.517 472 418 40 485 382 561 18 282 532 49 183 95
2023/20241.631 100 142 94 86 148 355 106 96 21 200 71 212
2024/2025270 20 28 222 0 0 0 0 0 0 0 0 0
Totale 21.886