Massacci, Fabio
 Distribuzione geografica
Continente #
NA - Nord America 17.636
EU - Europa 4.125
AS - Asia 1.989
SA - Sud America 17
Continente sconosciuto - Info sul continente non disponibili 10
OC - Oceania 7
AF - Africa 6
Totale 23.790
Nazione #
US - Stati Uniti d'America 17.044
SG - Singapore 1.180
GB - Regno Unito 732
UA - Ucraina 708
DE - Germania 627
IT - Italia 624
CA - Canada 584
SE - Svezia 538
FI - Finlandia 420
CN - Cina 384
RU - Federazione Russa 171
BG - Bulgaria 162
KR - Corea 110
ID - Indonesia 79
TR - Turchia 67
JO - Giordania 56
VN - Vietnam 37
IN - India 29
FR - Francia 28
AT - Austria 26
NL - Olanda 25
BR - Brasile 10
GR - Grecia 8
IR - Iran 7
AU - Australia 6
BE - Belgio 6
CH - Svizzera 6
EU - Europa 6
PK - Pakistan 6
HU - Ungheria 5
IQ - Iraq 5
BY - Bielorussia 4
JP - Giappone 4
LU - Lussemburgo 4
MX - Messico 4
PA - Panama 4
PH - Filippine 4
A2 - ???statistics.table.value.countryCode.A2??? 3
AE - Emirati Arabi Uniti 3
CZ - Repubblica Ceca 3
ES - Italia 3
GE - Georgia 3
HK - Hong Kong 3
IE - Irlanda 3
LT - Lituania 3
PL - Polonia 3
PT - Portogallo 3
RO - Romania 3
AL - Albania 2
AZ - Azerbaigian 2
CL - Cile 2
DK - Danimarca 2
IL - Israele 2
KG - Kirghizistan 2
LK - Sri Lanka 2
PE - Perù 2
SK - Slovacchia (Repubblica Slovacca) 2
TW - Taiwan 2
A1 - Anonimo 1
AR - Argentina 1
BO - Bolivia 1
EC - Ecuador 1
EE - Estonia 1
EG - Egitto 1
LV - Lettonia 1
MA - Marocco 1
MU - Mauritius 1
MY - Malesia 1
NO - Norvegia 1
NZ - Nuova Zelanda 1
PS - Palestinian Territory 1
RS - Serbia 1
SC - Seychelles 1
SN - Senegal 1
ZA - Sudafrica 1
Totale 23.790
Città #
Fairfield 2.330
Chandler 1.716
Jacksonville 1.526
Ashburn 1.176
Woodbridge 1.016
Singapore 984
Seattle 974
Wilmington 973
Houston 866
Cambridge 725
Ann Arbor 644
Santa Clara 603
Columbus 587
Montréal 554
San Mateo 462
Princeton 439
Mcallen 400
Munich 345
Trento 234
San Diego 165
Sofia 160
Beijing 154
New York 153
Dearborn 151
Moscow 127
Helsinki 126
Lawrence 116
Boardman 112
London 83
Jakarta 72
Lappeenranta 71
Düsseldorf 64
Falls Church 63
Izmir 59
San Paolo di Civitate 51
Norwalk 42
Padova 33
Washington 31
Los Angeles 30
Kilburn 29
Koblenz 26
Milan 25
Andover 24
Dallas 24
Hefei 24
Vienna 24
Toronto 22
Rome 21
Udine 20
Des Moines 19
Kunming 19
Como 18
Nanjing 18
Verona 17
Bolzano 16
Dong Ket 15
Altamura 13
Guangzhou 13
Jinan 13
Hanover 12
Frankfurt am Main 11
Shanghai 11
Costa Mesa 10
Nanchang 10
Trieste 10
Hounslow 9
Phoenix 9
San Jose 9
Bassano del Grappa 8
Leawood 8
North Bergen 8
Ottawa 8
Shenyang 8
Augusta 7
Hamburg 7
Monmouth Junction 7
Prescot 7
Zhengzhou 7
Acton 6
Chicago 6
Council Bluffs 6
Fort Worth 6
Karlsruhe 6
Kretz 6
Lavis 6
New Bedfont 6
Wuhan 6
Birmensdorf 5
Bonndorf 5
Chiswick 5
Eindhoven 5
Münstermaifeld 5
Ardabil 4
Bekasi 4
Bologna 4
Brooklyn 4
Burdur 4
Chengdu 4
Comabbio 4
Fremont 4
Totale 19.094
Nome #
Attack potential in impact & complexity 511
How CVSS is DOSsing your patching policy (and wasting your money) 504
Quantitative Assessment of Risk Reduction with Cybercrime Black Market Monitoring 502
The Work-Averse Attacker Model 470
An automatic method for assessing the versions affected by a vulnerability 327
Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training 202
Then and now: on the maturity of the cybercrime markets: the lesson that black-hat marketeers learned 178
A Dynamic Security Framework for Ambient Intelligent Systems: A smart-Home Based eHealth Application 178
Runtime Enforcement of Security Policies on Black Box Reactive Programs 171
Security Events and Vulnerability Data for Cybersecurity Risk Estimation 162
Economic Impacts of Rules-versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers 150
Action, Inaction, Trust, and Cybersecurity's Common Property Problem 150
Model Comprehension for Security Risk Assessment: An Empirical Comparison of Tabular vs. Graphical Representations 145
A Screening Test for Disclosed Vulnerabilities in FOSS Components 144
Engineering Secure Future Internet Services 143
A Preliminary Analysis of Vulnerability Scores for Attacks in Wild 125
A relative cost-benefit approach for evaluating alternative airport security policies 123
A negotiation scheme for access rights establishment in autonomic communication 123
An Interactive Trust Management and Negotiation Scheme 119
A Protocol’s Life After Attacks 117
A method for security governance, risk, and compliance (GRC): A goal-process approach 117
Governance Challenges for European Cybersecurity Policies: Stakeholder Views 115
An approach for decision support on the uncertainty in feature model evolution 114
How to Select a Security Requirements Method? A Comparative Study with Students and Practitioners 114
Interactive credential negotiation for stateful business processes 113
Which Security Catalogue Is Better for Novices? 113
An Extended Ontology for Security Requirements 111
An Idea of an Independent Validation of Vulnerability Discovery Models 111
On the equivalence between graphical and tabular representations for security risk assessment 111
Load time code validation for mobile phone Java Cards 110
MULTI-CONTEXT EXPLOIT TEST MANAGEMENT 110
Computer Aided Threat Identification 109
Crime pays if you are just an average hacker 109
Interactive Access Control for Web Services 108
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications 108
Load Time Security Verification 108
Estimating the assessment difficulty of CVSS environmental metrics: An experiment 108
EMFASE - An empirical framework for security design and economic trade-off 107
Tableaux and Algorithms for Propositional Dynamic Logic with Converse 107
An experiment on comparing textual vs. visual industrial methods for security risk assessment 107
An empirical study of the technology transfer potential of EU security and trust R&D projects 106
Security requirements engineering: The si*modeling language and the Secure Tropos methodology 106
A Model-Driven Approach for the Specification and Analysis of Access Control Policies 105
A Tool for Managing Evolving Security Requirements 105
Identifying the implied: Findings from three differentiated replications on the use of security requirements templates 104
Managing changes with legacy security engineering processes 103
Security in the Firefox OS and Tizen mobile platforms 103
A survey of autonomic communications 103
Satisfaction of control objectives by control processes 103
An Experimental Comparison of Two Risk-Based Security Methods 103
An empirical methodology to evaluate vulnerability discovery models 102
From Trust to Dependability through Risk Analysis 102
Can we support applications' evolution in multi-application smart cards by security-by-contract? 102
SecureChange: Security engineering for lifelong evolvable systems 101
Evaluation of airport security training programs: Perspectives and issues 101
IT Interdependence and the Economic Fairness of Cybersecurity Regulations for Civil Aviation 101
An Executable Specification Language for Planning Attacks to Security Protocols 100
Security and Trust in IT Business Outsourcing: a Manifesto 100
TestREx: a framework for repeatable exploits 100
FuturesMEX: Secure, Distributed Futures Market Exchange 100
Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques 100
From Hippocratic Databases to Secure Tropos: A Computer-Aided Re-engineering Approach 99
Empirical Assessment of Security Requirements and Architecture: Lessons Learned 99
Assessing a requirements evolution approach: Empirical studies in the air traffic management domain 99
Security views for outsourced business processes 98
An Algorithm for the Appraisal of Assurance Indicators for Complex Business Processes 98
Security-by-Contract for the OSGi platform 98
Delta-Bench: Differential Benchmark for Static Analysis Security Testing Tools 98
Blockchain-based Invoice Factoring: from business requirements to commitments 98
A Flexible Security Architecture to Support Third-party Applications on Mobile Devices. 97
The role of catalogues of threats and security controls in security risk assessment: An empirical study with ATM professionals 97
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System 97
Comparing vulnerability severity and exploits using case-control studies 96
A System for Interactive Authorization for Business Processes for Web Services 96
Security-by-contract for the future internet 96
Breaking security protocols as an AI planning problem 95
ST-Tool: a case tool for modeling and analyzing trust requirements 95
Reactive non-interference for a browser model 95
Guest Editorial: Special Section on Software Reliability and Security 95
An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags 95
Dealing with Known Unknowns: Towards a Game-Theoretic Foundation for Software Requirement Evolution 95
A uniform tableaux method for nonmonotonic modal logics 94
An Access Control Framework for Business Processes for Web Services 94
A self-protecting and self-healing framework for negotiating services and trust in autonomic communication systems. 94
SeCMER: A Tool to Gain Control of Security Requirements Evolution 94
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes 94
Managing Evolution by Orchestrating Requirements and Testing Engineering Processes 93
Secure and Dependable Patterns in Organizations: An Empirical Approach 92
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language 92
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures 92
A Tool for Managing Evolving Security Requirements 92
Predictability of Enforcement 92
A Load Time Policy Checker for Open Multi-application Smart Cards 92
E Pluribus Unum: Deduction, Abduction and Induction, the Reasoning Services for Access Control in Autonomic Communication 91
From Early Requirements Analysis towards Secure Workflows 91
Detecting Conflicts of Interest 91
Designing Security Requirements Models through Planning 91
How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns 91
An Independent Validation of Vulnerability Discovery Models 91
Teaching predictive modeling to junior software engineers - Seminar format and its evaluation 91
Totale 12.592
Categoria #
all - tutte 114.851
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 440
selected - selezionate 0
volume - volumi 6.840
Totale 122.131


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202.865 0 0 0 0 0 437 641 410 609 284 215 269
2020/20213.581 141 364 107 498 383 308 319 183 320 256 456 246
2021/20223.202 145 631 37 170 73 85 163 602 179 232 296 589
2022/20233.517 472 418 40 485 382 561 18 282 532 49 183 95
2023/20241.631 100 142 94 86 148 355 106 96 21 200 71 212
2024/20252.599 20 28 362 1.127 315 747 0 0 0 0 0 0
Totale 24.215