MAIORCA, DAVIDE
 Distribuzione geografica
Continente #
EU - Europa 58.333
NA - Nord America 3.209
AS - Asia 2.401
SA - Sud America 327
AF - Africa 124
OC - Oceania 38
Continente sconosciuto - Info sul continente non disponibili 7
Totale 64.439
Nazione #
IT - Italia 57.226
US - Stati Uniti d'America 3.103
SG - Singapore 767
CN - Cina 629
VN - Vietnam 242
BR - Brasile 240
DE - Germania 206
SE - Svezia 203
HK - Hong Kong 149
GB - Regno Unito 134
IN - India 112
FR - Francia 109
UA - Ucraina 104
IL - Israele 82
FI - Finlandia 79
JP - Giappone 64
KR - Corea 63
CA - Canada 60
PK - Pakistan 46
NL - Olanda 38
MX - Messico 36
ID - Indonesia 33
BD - Bangladesh 31
AU - Australia 30
ES - Italia 29
RU - Federazione Russa 29
AR - Argentina 27
BE - Belgio 25
TR - Turchia 25
AT - Austria 22
ZA - Sudafrica 22
CI - Costa d'Avorio 21
CO - Colombia 21
MY - Malesia 21
EG - Egitto 20
IQ - Iraq 18
PL - Polonia 18
SA - Arabia Saudita 17
TW - Taiwan 17
IR - Iran 14
KE - Kenya 13
PH - Filippine 13
DZ - Algeria 12
EC - Ecuador 12
IE - Irlanda 11
IS - Islanda 10
MA - Marocco 10
NO - Norvegia 10
GH - Ghana 9
LU - Lussemburgo 9
UZ - Uzbekistan 9
GR - Grecia 8
NZ - Nuova Zelanda 8
PT - Portogallo 8
TH - Thailandia 8
VE - Venezuela 8
AL - Albania 7
AZ - Azerbaigian 7
CZ - Repubblica Ceca 7
JO - Giordania 7
LT - Lituania 7
CL - Cile 6
EU - Europa 6
RO - Romania 6
TN - Tunisia 6
HU - Ungheria 5
PY - Paraguay 5
AE - Emirati Arabi Uniti 4
CH - Svizzera 4
SN - Senegal 4
BO - Bolivia 3
DK - Danimarca 3
EE - Estonia 3
HR - Croazia 3
JM - Giamaica 3
KZ - Kazakistan 3
NP - Nepal 3
PA - Panama 3
PE - Perù 3
PS - Palestinian Territory 3
SK - Slovacchia (Repubblica Slovacca) 3
AO - Angola 2
DO - Repubblica Dominicana 2
KG - Kirghizistan 2
LV - Lettonia 2
OM - Oman 2
QA - Qatar 2
TZ - Tanzania 2
AM - Armenia 1
BG - Bulgaria 1
BN - Brunei Darussalam 1
BW - Botswana 1
BY - Bielorussia 1
CR - Costa Rica 1
ET - Etiopia 1
GY - Guiana 1
IM - Isola di Man 1
KH - Cambogia 1
LB - Libano 1
LK - Sri Lanka 1
Totale 64.430
Città #
Cagliari 55.432
Uta 1.281
Singapore 481
Ashburn 338
Chandler 252
Dallas 243
San Jose 197
Fairfield 186
Ann Arbor 161
Woodbridge 134
Beijing 126
Hong Kong 115
Nyköping 111
Boardman 105
Los Angeles 104
Wilmington 86
Ho Chi Minh City 83
Seattle 81
Houston 79
Cambridge 64
Dearborn 63
Shanghai 55
Hanoi 53
Jacksonville 49
Santa Clara 48
Munich 47
Hefei 44
Helsinki 43
Lauterbourg 41
Rome 41
Seoul 40
Milan 37
Tokyo 36
The Dalles 35
New York 34
Boston 33
Council Bluffs 26
Frankfurt am Main 26
Brussels 23
Buffalo 22
Nanjing 22
São Paulo 22
Abidjan 20
Gandhinagar 20
London 20
Montreal 20
Naples 19
Orem 18
Redwood City 18
Rishon LeTsiyyon 18
Petah Tikva 17
Redondo Beach 17
Amsterdam 16
Bengaluru 15
Tel Aviv 15
Dong Ket 14
Hebei 14
San Diego 14
Kuala Lumpur 13
Manchester 13
Nairobi 13
Vienna 13
Warsaw 13
Guangzhou 12
Lappeenranta 12
Belo Horizonte 11
Columbus 11
Dublin 11
Hangzhou 11
San Francisco 11
Zhengzhou 11
Chicago 10
Da Nang 10
Denver 10
Jakarta 10
Jerusalem 10
Melbourne 10
Mexico City 10
Ottawa 10
Palermo 10
Paris 10
Phoenix 10
Sassari 10
Sestu 10
Tianjin 10
Toronto 10
Turku 10
Accra 9
Ankara 9
Atlanta 9
Bissen 9
Chennai 9
Genoa 9
Hamburg 9
Johannesburg 9
Lahore 9
Multan 9
Portsmouth 9
Shenyang 9
Stockholm 9
Totale 61.206
Nome #
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files 3.169
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 3.044
An Evasion Resilient Approach to the Detection of Malicious PDF Files 2.945
Clustering android malware families by Http traffic 2.914
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.842
R-PackDroid: API package-based characterization and detection of mobile ransomware 2.768
Explaining black-box android malware detection 2.767
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References 2.542
Stealth attacks: An extended insight into the obfuscation effects on Android malware 2.357
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation 2.323
Evasion attacks against machine learning at test time 2.320
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2.312
Towards adversarial malware detection: lessons learned from PDF-based attacks 2.266
On the Robustness of Mobile Device Fingerprinting 2.082
On the effectiveness of system API-related information for Android ransomware detection 2.041
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection 1.999
null 1.989
A Pattern Recognition System for Malicious PDF Files Detection 1.967
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 1.905
Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware 1.780
Adversarial detection of Flash Malware: limitations and Open issues 1.702
Design and implementation of robust systems for secure malware detection 1.596
On the Feasibility of Adversarial Sample Creation Using the Android System API 1.596
Cybersecurity and AI: The PRALab Research Experience 1.393
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1.216
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis 1.012
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1.011
Oblivion: an open-source system for large-scale analysis of macro-based office malware 754
Security Evaluation of Support Vector Machines in Adversarial Environments 670
A Longitudinal Study of Cryptographic API: A Decade of Android Malware 597
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 569
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps 494
A Targeted Assessment of Cross-Site Scripting Detection Tools 442
Do you Trust your Device? Open Challenges in IoT Security Analysis 439
Explaining the use of cryptographic API in Android malware 415
Enhancing android malware detection explainability through function call graph APIs 397
On the Feasibility of Android Stegomalware: A Detection Study 300
An Experimental Analysis of Semi-supervised Learning for Malware Detection 255
Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssembly 238
A risk estimation study of native code vulnerabilities in Android applications 231
Exposing the Cracks: A Case Study on the Quality of Public Linux Malware Data Sets 215
Are Trees Really Green? A Detection Approach of IoT Malware Attacks 193
Race against time: investigating the factors that influence web race condition exploits 142
HTTP/3 will not Save you from Request Smuggling: A Methodology to Detect HTTP/3 Header (mis)Validations 141
Secure and Trusted Crowdsensing for Outdoor Air Quality Monitoring: State of the Art and Perspectives 102
null 80
DroidReach++: Exploring the reachability of native code in android applications 74
Evaluation of Resource-Aware HTTP/3 Proxies for Smuggling Resilience in IoT Environments 21
SHAP happens: an explainable IDS for industrial IoT networks 18
An Assessment of the Overlooked Dangers of Template Engines 17
{{alert(’CSTI’)}}: Large-Scale Detection of Client-Side Template Injection 13
Totale 64.675
Categoria #
all - tutte 80.990
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 80.990


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.631 0 0 0 0 0 0 0 0 0 516 724 391
2021/20223.869 339 248 199 278 234 327 315 199 365 349 344 672
2022/20237.111 711 1.187 866 607 587 528 361 385 495 481 629 274
2023/20246.408 249 195 260 359 747 885 1.061 482 268 470 678 754
2024/202511.770 2.453 2.933 1.278 1.330 788 967 1.159 118 157 116 166 305
2025/20264.640 481 346 455 376 373 325 1.166 294 356 468 0 0
Totale 64.675