GIACINTO, GIORGIO
 Distribuzione geografica
Continente #
EU - Europa 209.129
NA - Nord America 13.985
AS - Asia 6.648
SA - Sud America 946
AF - Africa 189
OC - Oceania 54
Continente sconosciuto - Info sul continente non disponibili 21
Totale 230.972
Nazione #
IT - Italia 205.397
US - Stati Uniti d'America 13.754
SG - Singapore 2.367
CN - Cina 2.179
UA - Ucraina 887
SE - Svezia 728
BR - Brasile 720
DE - Germania 649
VN - Vietnam 596
GB - Regno Unito 341
HK - Hong Kong 334
FI - Finlandia 332
FR - Francia 325
IN - India 241
KR - Corea 154
CA - Canada 144
JP - Giappone 106
IL - Israele 85
RU - Federazione Russa 85
AR - Argentina 80
BD - Bangladesh 70
PK - Pakistan 70
MX - Messico 60
BE - Belgio 57
ID - Indonesia 57
TR - Turchia 53
NL - Olanda 51
IQ - Iraq 49
ES - Italia 47
AU - Australia 41
CO - Colombia 36
PL - Polonia 36
MY - Malesia 35
SA - Arabia Saudita 35
ZA - Sudafrica 35
AT - Austria 34
EC - Ecuador 31
EG - Egitto 29
KE - Kenya 29
PH - Filippine 29
TW - Taiwan 25
MA - Marocco 22
UZ - Uzbekistan 21
CL - Cile 20
EU - Europa 20
CI - Costa d'Avorio 19
IE - Irlanda 19
TH - Thailandia 18
VE - Venezuela 18
AZ - Azerbaigian 17
NO - Norvegia 16
RO - Romania 16
IR - Iran 15
CZ - Repubblica Ceca 14
KZ - Kazakistan 14
PY - Paraguay 14
JO - Giordania 13
NZ - Nuova Zelanda 13
NP - Nepal 12
PE - Perù 12
TN - Tunisia 12
IS - Islanda 11
GH - Ghana 10
AE - Emirati Arabi Uniti 9
DZ - Algeria 9
LU - Lussemburgo 9
PT - Portogallo 9
AL - Albania 8
BO - Bolivia 7
ET - Etiopia 7
HU - Ungheria 7
LT - Lituania 7
CH - Svizzera 6
DO - Repubblica Dominicana 6
GR - Grecia 6
LK - Sri Lanka 5
OM - Oman 5
QA - Qatar 5
SK - Slovacchia (Repubblica Slovacca) 5
UY - Uruguay 5
BY - Bielorussia 4
CR - Costa Rica 4
EE - Estonia 4
HR - Croazia 4
JM - Giamaica 4
KG - Kirghizistan 4
LB - Libano 4
SN - Senegal 4
SY - Repubblica araba siriana 4
AM - Armenia 3
LV - Lettonia 3
PA - Panama 3
UG - Uganda 3
AO - Angola 2
BG - Bulgaria 2
BH - Bahrain 2
DK - Danimarca 2
GE - Georgia 2
GY - Guiana 2
IM - Isola di Man 2
Totale 230.936
Città #
Cagliari 200.109
Uta 4.354
Fairfield 1.427
Singapore 1.313
Ashburn 1.167
Chandler 1.132
Woodbridge 1.114
Ann Arbor 702
Houston 672
Dallas 639
Seattle 617
San Jose 572
Wilmington 561
Cambridge 508
Boardman 495
Jacksonville 483
Nyköping 426
Beijing 414
Dearborn 285
Hong Kong 266
Los Angeles 260
Ho Chi Minh City 190
Shanghai 183
Helsinki 168
Lauterbourg 160
Nanjing 160
Santa Clara 156
The Dalles 151
Boston 145
Hefei 135
Hanoi 129
Seoul 119
Milan 85
Munich 82
Hangzhou 76
New York 75
Buffalo 74
Guangzhou 74
Council Bluffs 71
São Paulo 70
San Diego 66
Tokyo 66
Redwood City 65
Frankfurt am Main 63
Rome 58
Columbus 56
Shenyang 54
Brussels 53
Nanchang 53
Hebei 51
Redondo Beach 51
Changsha 47
Mountain View 44
Ottawa 42
Toronto 42
Tianjin 39
Sassari 38
Chicago 37
Orem 36
London 34
Warsaw 29
Haiphong 28
Montreal 28
Rio de Janeiro 28
Auburn Hills 27
Dong Ket 27
Jinan 27
Nairobi 27
Zhengzhou 27
Orange 26
Amsterdam 25
Jiaxing 24
San Francisco 23
Mumbai 22
Naples 22
Brooklyn 21
Da Nang 21
Atlanta 20
Denver 20
Gandhinagar 20
Lahore 20
Manchester 20
Norwalk 20
Abidjan 19
Baghdad 19
Belo Horizonte 19
Washington 19
Rishon LeTsiyyon 18
Tel Aviv 18
Petah Tikva 17
Stockholm 17
Brasília 16
Chennai 16
Dublin 16
Johannesburg 16
Kunming 16
Nuremberg 16
Phoenix 16
Tashkent 16
Verona 16
Totale 221.656
Nome #
Fast image classification with reduced multiclass support vector machines 3.523
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies 3.257
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files 3.169
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps 3.142
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 3.091
Yet Another Cybersecurity Roadmapping Methodology 3.077
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 3.044
An Evasion Resilient Approach to the Detection of Malicious PDF Files 2.945
Detecting Misuse of Google Cloud Messaging in Android Badware 2.945
Clustering android malware families by Http traffic 2.914
Infinity-norm support vector machines against adversarial label contamination 2.844
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.841
Poisoning behavioral malware clustering 2.783
Pharmaguard WebApp: An application for the detection of illegal online pharmacies 2.773
R-PackDroid: API package-based characterization and detection of mobile ransomware 2.768
Explaining black-box android malware detection 2.766
Machine Learning in Security Applications 2.746
Who are you? A statistical approach to measuring user authenticity 2.728
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2.581
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References 2.542
2020 Cybercrime Economic Costs: No Measure No Solution 2.526
Information fusion in content based image retrieval: A comprehensive overview 2.521
Stealth attacks: An extended insight into the obfuscation effects on Android malware 2.357
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation 2.323
Evasion attacks against machine learning at test time 2.320
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2.311
Towards adversarial malware detection: lessons learned from PDF-based attacks 2.266
HMMpayl: An Intrusion Detection System Based On Hidden Markov Models 2.254
A hybrid approach for retrieving diverse social images of landmarks 2.254
Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware 2.199
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification 2.175
DroidSieve: Fast and accurate classification of obfuscated android malware 2.151
Machine Learning in Security Applications 2.149
Multimodal-based Diversified Summarization in Social Image Retrieval 2.137
On the Robustness of Mobile Device Fingerprinting 2.082
McPAD: A multiple classifier system for accurate payload-based anomaly detection 2.074
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 2.071
Ten years of relevance score for content based image retrieval 2.063
Multimodal retrieval with diversification and relevance feedback for tourist attraction images 2.048
On the effectiveness of system API-related information for Android ransomware detection 2.041
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices 2.038
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection 1.998
null 1.989
DLLMiner: structural mining for malware detection 1.980
User-driven Nearest-Neighbour Exploration of Image Archives 1.972
A Pattern Recognition System for Malicious PDF Files Detection 1.967
SuStorID: A multiple classifier system for the protection of web services 1.932
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 1.905
Machine learning in computer forensics (and the lessons learned from machine learning in computer security) 1.862
Diversity in Ensembles of Codebooks for Visual Concept Detection 1.814
HMMPayl: an application of HMM to the analysis of the HTTP Payload 1.791
ImageHunter: A Novel Tool for Relevance Feedback in Content Based Image Retrieval 1.786
Designing multiple biometric systems: Measures of ensemble effectiveness 1.767
A study on the evaluation of relevance feedback in multi-tagged image datasets 1.762
The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task 1.743
Adversarial detection of Flash Malware: limitations and Open issues 1.701
Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task 1.676
A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers 1.641
ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval 1.632
On the Feasibility of Adversarial Sample Creation Using the Android System API 1.596
A score decidability index for dynamic score combination 1.585
HMM-Web: A Framework for the Detection of Attacks Against Web Applications 1.575
Fusion of multiple classifiers for intrusion detection in computer networks 1.556
Sensing attacks in computers networks with hidden Markov models 1.550
Open issues on codebook generation in image classification tasks 1.516
Detection of Intrusions and Malware, and Vulnerability Assessment 1.475
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback 1.445
Automotive cybersecurity: Foundations for next-generation vehicles 1.437
Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering 1.435
Ensemble learning for Intrusion Detection in Computer Networks 1.349
Pattern Recognition and Information Fusion for Ambient and Computer Network Security 1.316
null 1.297
Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval 1.243
Enhancing Image Retrieval by an Exploration-Exploitation Approach 1.240
Synthetic pattern generation for imbalanced learning in image retrieval 1.226
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1.216
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis 1.176
"Tabu search coupled with deterministic strategies for the optimal design of MRI devices" 1.127
null 1.024
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis 1.011
Do gradient-based explanations tell anything about adversarial robustness to android malware? 1.010
Defensive Programming for Smart Home Cybersecurity 1.001
Dissimilarity representation in multi-feature spaces for image retrieval 991
null 961
null 916
Explanation-Driven Characterization of Android Ransomware 897
On the Role of Explainable Machine Learning for Secure Smart Vehicles 892
null 882
null 850
McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications 829
Neighborhood-based feature weighting for relevance feedback in content-based retrieval 826
Unbalanced learning in content-based image classification and retrieval 811
null 804
K-Nearest Neighbors directed synthetic images injection 787
null 781
Intrusion Detection Systems based on anomaly detection techniques 764
Dynamic Score Selection for Fusion of Multiple Biometric Matchers 758
Oblivion: an open-source system for large-scale analysis of macro-based office malware 754
Adaptive query shifting for content-based image retrieval 735
Detection of Intrusions and Malware, and Vulnerability Assessment 715
Totale 183.116
Categoria #
all - tutte 299.555
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 299.555


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20215.453 0 0 0 0 0 0 0 0 0 1.758 1.918 1.777
2021/202214.102 1.495 990 665 881 1.074 927 1.169 647 1.334 1.437 1.193 2.290
2022/202323.997 2.320 3.598 2.790 1.951 1.733 1.897 1.132 2.125 1.485 1.822 2.136 1.008
2023/202423.560 963 1.134 1.133 1.341 2.688 3.382 3.146 1.555 884 2.386 2.300 2.648
2024/202535.254 6.770 8.610 4.565 3.886 2.497 2.987 3.660 342 483 352 392 710
2025/202611.096 988 713 1.305 866 842 789 2.514 843 957 1.279 0 0
Totale 231.586