GIACINTO, GIORGIO
 Distribuzione geografica
Continente #
EU - Europa 206.348
NA - Nord America 12.967
AS - Asia 5.053
SA - Sud America 798
AF - Africa 123
OC - Oceania 54
Continente sconosciuto - Info sul continente non disponibili 20
Totale 225.363
Nazione #
IT - Italia 203.025
US - Stati Uniti d'America 12.766
CN - Cina 1.962
SG - Singapore 1.839
UA - Ucraina 881
SE - Svezia 722
BR - Brasile 657
DE - Germania 608
GB - Regno Unito 314
VN - Vietnam 279
FI - Finlandia 251
IN - India 178
KR - Corea 151
FR - Francia 147
HK - Hong Kong 137
CA - Canada 135
IL - Israele 82
JP - Giappone 82
RU - Federazione Russa 71
BE - Belgio 56
AR - Argentina 54
MX - Messico 48
AU - Australia 41
PK - Pakistan 40
BD - Bangladesh 39
ES - Italia 39
NL - Olanda 39
PL - Polonia 34
AT - Austria 30
ZA - Sudafrica 29
MY - Malesia 27
TR - Turchia 27
ID - Indonesia 25
TW - Taiwan 23
SA - Arabia Saudita 22
CO - Colombia 20
EU - Europa 20
CI - Costa d'Avorio 19
EC - Ecuador 19
IQ - Iraq 19
KE - Kenya 16
NO - Norvegia 16
IR - Iran 15
RO - Romania 15
CZ - Repubblica Ceca 14
EG - Egitto 14
TH - Thailandia 14
AZ - Azerbaigian 13
KZ - Kazakistan 13
MA - Marocco 13
NZ - Nuova Zelanda 13
IE - Irlanda 12
PH - Filippine 12
IS - Islanda 11
UZ - Uzbekistan 11
VE - Venezuela 11
PE - Perù 10
CL - Cile 9
LU - Lussemburgo 9
AE - Emirati Arabi Uniti 8
GH - Ghana 7
JO - Giordania 7
PY - Paraguay 7
TN - Tunisia 7
DZ - Algeria 6
LT - Lituania 6
DO - Repubblica Dominicana 5
HU - Ungheria 5
PT - Portogallo 5
AL - Albania 4
BO - Bolivia 4
BY - Bielorussia 4
CH - Svizzera 4
EE - Estonia 4
KG - Kirghizistan 4
LK - Sri Lanka 4
NP - Nepal 4
QA - Qatar 4
SK - Slovacchia (Repubblica Slovacca) 4
UY - Uruguay 4
CR - Costa Rica 3
ET - Etiopia 3
GR - Grecia 3
LV - Lettonia 3
AM - Armenia 2
AO - Angola 2
BG - Bulgaria 2
DK - Danimarca 2
GY - Guiana 2
IM - Isola di Man 2
JM - Giamaica 2
LB - Libano 2
PA - Panama 2
PS - Palestinian Territory 2
SI - Slovenia 2
TZ - Tanzania 2
UG - Uganda 2
BA - Bosnia-Erzegovina 1
BH - Bahrain 1
BN - Brunei Darussalam 1
Totale 225.346
Città #
Cagliari 197.819
Uta 4.354
Fairfield 1.426
Chandler 1.132
Woodbridge 1.114
Ashburn 1.046
Singapore 921
Ann Arbor 702
Houston 670
Dallas 638
Seattle 616
Wilmington 561
Cambridge 508
Boardman 495
Jacksonville 483
Nyköping 426
Beijing 404
Dearborn 285
Los Angeles 202
Shanghai 178
Nanjing 158
Santa Clara 147
Boston 145
Hefei 134
Seoul 119
Ho Chi Minh City 101
Helsinki 90
Hong Kong 87
Milan 82
Munich 82
Buffalo 73
The Dalles 73
Hangzhou 72
New York 69
Guangzhou 67
Redwood City 65
San Diego 64
São Paulo 64
Columbus 56
Council Bluffs 56
Shenyang 54
Nanchang 53
Brussels 52
Hebei 51
Redondo Beach 51
Tokyo 49
Changsha 47
Hanoi 47
Rome 46
Mountain View 44
Ottawa 42
Toronto 40
Sassari 38
Frankfurt am Main 36
Tianjin 36
London 32
Chicago 31
Rio de Janeiro 28
Warsaw 28
Auburn Hills 27
Dong Ket 27
Jinan 26
Orange 26
Zhengzhou 25
Montreal 24
Jiaxing 23
San Francisco 23
San Jose 21
Brooklyn 20
Denver 20
Gandhinagar 20
Norwalk 20
Abidjan 19
Atlanta 18
Belo Horizonte 18
Rishon LeTsiyyon 18
Washington 18
Mumbai 17
Naples 17
Petah Tikva 17
Kunming 16
Stockholm 16
Tel Aviv 16
Verona 16
Brasília 15
Falls Church 15
Johannesburg 15
Nairobi 15
Sìnnai 15
Vienna 15
Amsterdam 14
Nuremberg 14
Phoenix 14
Düsseldorf 13
Indiana 13
Manchester 13
Melbourne 13
Turku 13
Chennai 12
Karlsruhe 12
Totale 217.318
Nome #
Fast image classification with reduced multiclass support vector machines 3.493
PharmaGuard: Automatic identification of illegal search-indexed online pharmacies 3.223
A Structural and Content-Based Approach for a Precise and Robust Detection of Malicious PDF Files 3.135
A (Cyber)ROAD to the Future: A Methodology for Building Cybersecurity Research Roadmaps 3.094
Deepsquatting: Learning-based typosquatting detection at deeper domain levels 3.043
Yet Another Cybersecurity Roadmapping Methodology 3.036
Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection 2.999
Detecting Misuse of Google Cloud Messaging in Android Badware 2.916
An Evasion Resilient Approach to the Detection of Malicious PDF Files 2.896
Clustering android malware families by Http traffic 2.877
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables 2.807
Infinity-norm support vector machines against adversarial label contamination 2.794
Poisoning behavioral malware clustering 2.760
Pharmaguard WebApp: An application for the detection of illegal online pharmacies 2.744
R-PackDroid: API package-based characterization and detection of mobile ransomware 2.729
Explaining black-box android malware detection 2.726
Machine Learning in Security Applications 2.706
Who are you? A statistical approach to measuring user authenticity 2.696
One-and-a-half-class multiple classifier systems for secure learning against evasion attacks at test time 2.554
Lux0R: Detection of Malicious PDF-embedded JavaScript code through Discriminant Analysis of API References 2.521
Information fusion in content based image retrieval: A comprehensive overview 2.488
2020 Cybercrime Economic Costs: No Measure No Solution 2.483
Stealth attacks: An extended insight into the obfuscation effects on Android malware 2.322
Evasion attacks against machine learning at test time 2.297
Evaluating Analysis Tools for Android Apps: Status Quo and Robustness Against Obfuscation 2.286
Detection of malicious scripting code through discriminant and adversary-aware API analysis 2.266
Towards adversarial malware detection: lessons learned from PDF-based attacks 2.231
A hybrid approach for retrieving diverse social images of landmarks 2.229
HMMpayl: An Intrusion Detection System Based On Hidden Markov Models 2.228
Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware 2.169
Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification 2.154
DroidSieve: Fast and accurate classification of obfuscated android malware 2.117
Machine Learning in Security Applications 2.116
Multimodal-based Diversified Summarization in Social Image Retrieval 2.109
On the Robustness of Mobile Device Fingerprinting 2.061
McPAD: A multiple classifier system for accurate payload-based anomaly detection 2.047
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues 2.042
Ten years of relevance score for content based image retrieval 2.041
On the effectiveness of system API-related information for Android ransomware detection 2.011
Multimodal retrieval with diversification and relevance feedback for tourist attraction images 2.010
IntelliAV: Toward the feasibility of building intelligent anti-malware on Android devices 1.992
null 1.989
Looking at the bag is not enough to find the bomb: an evasion of structural methods for malicious PDF files detection 1.946
DLLMiner: structural mining for malware detection 1.943
A Pattern Recognition System for Malicious PDF Files Detection 1.939
User-driven Nearest-Neighbour Exploration of Image Archives 1.938
SuStorID: A multiple classifier system for the protection of web services 1.914
PowerDrive: Accurate De-obfuscation and Analysis of PowerShell Malware 1.864
Machine learning in computer forensics (and the lessons learned from machine learning in computer security) 1.830
Diversity in Ensembles of Codebooks for Visual Concept Detection 1.793
HMMPayl: an application of HMM to the analysis of the HTTP Payload 1.777
ImageHunter: A Novel Tool for Relevance Feedback in Content Based Image Retrieval 1.763
Designing multiple biometric systems: Measures of ensemble effectiveness 1.750
A study on the evaluation of relevance feedback in multi-tagged image datasets 1.738
The PRA and AmILAB at ImageCLEF 2012 Photo Flickr Annotation Task 1.711
Adversarial detection of Flash Malware: limitations and Open issues 1.660
Image Hunter at ImageCLEF 2012 Personal Photo Retrieval Task 1.643
ImageHunter: a Novel Tool for Relevance Feedback in Content Based Image Retrieval 1.607
A modular architecture for the analysis of HTTP payloads based on Multiple Classifiers 1.606
On the Feasibility of Adversarial Sample Creation Using the Android System API 1.561
HMM-Web: A Framework for the Detection of Attacks Against Web Applications 1.554
A score decidability index for dynamic score combination 1.547
Fusion of multiple classifiers for intrusion detection in computer networks 1.533
Sensing attacks in computers networks with hidden Markov models 1.520
Open issues on codebook generation in image classification tasks 1.483
Detection of Intrusions and Malware, and Vulnerability Assessment 1.450
Retrieval of Diverse Images by Pre-filtering and Hierarchical Clustering 1.411
Convolutional neural networks for relevance feedback in content based image retrieval: a content based image retrieval system that exploits convolutional neural networks both for feature extraction and for relevance feedback 1.407
Automotive cybersecurity: Foundations for next-generation vehicles 1.400
Ensemble learning for Intrusion Detection in Computer Networks 1.330
Pattern Recognition and Information Fusion for Ambient and Computer Network Security 1.299
null 1.297
Passive-Aggressive Online Learning for Relevance Feedback in Content Based Image Retrieval 1.228
Enhancing Image Retrieval by an Exploration-Exploitation Approach 1.210
Synthetic pattern generation for imbalanced learning in image retrieval 1.191
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware 1.152
Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis 1.144
"Tabu search coupled with deterministic strategies for the optimal design of MRI devices" 1.107
null 1.024
Defensive Programming for Smart Home Cybersecurity 968
Do gradient-based explanations tell anything about adversarial robustness to android malware? 963
null 961
Dissimilarity representation in multi-feature spaces for image retrieval 961
PowerDecode: a PowerShell Script Decoder Dedicated to Malware Analysis 956
null 916
null 882
On the Role of Explainable Machine Learning for Secure Smart Vehicles 867
Explanation-Driven Characterization of Android Ransomware 865
null 850
McPAD and HMMWeb: two different approaches for the detection of attacks against Web applications 812
Neighborhood-based feature weighting for relevance feedback in content-based retrieval 812
null 804
Unbalanced learning in content-based image classification and retrieval 793
null 781
K-Nearest Neighbors directed synthetic images injection 773
Intrusion Detection Systems based on anomaly detection techniques 745
Dynamic Score Selection for Fusion of Multiple Biometric Matchers 738
Adaptive query shifting for content-based image retrieval 714
Detection of Intrusions and Malware, and Vulnerability Assessment 685
Oblivion: an open-source system for large-scale analysis of macro-based office malware 681
Totale 180.234
Categoria #
all - tutte 291.927
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 291.927


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/202118.402 0 0 0 0 0 4.985 4.329 2.544 1.091 1.758 1.918 1.777
2021/202214.102 1.495 990 665 881 1.074 927 1.169 647 1.334 1.437 1.193 2.290
2022/202323.997 2.320 3.598 2.790 1.951 1.733 1.897 1.132 2.125 1.485 1.822 2.136 1.008
2023/202423.560 963 1.134 1.133 1.341 2.688 3.382 3.146 1.555 884 2.386 2.300 2.648
2024/202535.254 6.770 8.610 4.565 3.886 2.497 2.987 3.660 342 483 352 392 710
2025/20265.459 988 713 1.305 866 842 745 0 0 0 0 0 0
Totale 225.949