BUGLIESI, Michele
 Distribuzione geografica
Continente #
NA - Nord America 13.354
EU - Europa 7.018
AS - Asia 3.872
SA - Sud America 221
AF - Africa 104
Continente sconosciuto - Info sul continente non disponibili 20
OC - Oceania 17
Totale 24.606
Nazione #
US - Stati Uniti d'America 13.034
CN - Cina 2.230
IT - Italia 1.301
PL - Polonia 1.186
DE - Germania 807
SG - Singapore 807
UA - Ucraina 567
IE - Irlanda 561
SE - Svezia 487
GB - Regno Unito 430
RU - Federazione Russa 420
FI - Finlandia 357
CA - Canada 295
HK - Hong Kong 234
FR - Francia 203
BR - Brasile 186
TR - Turchia 140
AT - Austria 109
NL - Olanda 107
IN - India 68
JP - Giappone 59
ES - Italia 57
BE - Belgio 54
PH - Filippine 52
CH - Svizzera 51
BG - Bulgaria 47
KR - Corea 47
ZA - Sudafrica 40
CZ - Repubblica Ceca 39
SI - Slovenia 35
VN - Vietnam 28
RO - Romania 26
IR - Iran 25
MD - Moldavia 25
PT - Portogallo 25
RS - Serbia 23
MY - Malesia 22
EU - Europa 20
ID - Indonesia 19
IL - Israele 19
TW - Taiwan 18
AU - Australia 16
BD - Bangladesh 15
SA - Arabia Saudita 15
DK - Danimarca 14
PK - Pakistan 14
GR - Grecia 13
NO - Norvegia 11
UY - Uruguay 11
UZ - Uzbekistan 11
HR - Croazia 10
BY - Bielorussia 9
CL - Cile 9
EG - Egitto 9
MX - Messico 9
MA - Marocco 8
HU - Ungheria 7
LT - Lituania 7
NG - Nigeria 7
TH - Thailandia 7
CM - Camerun 6
LB - Libano 6
LU - Lussemburgo 6
LV - Lettonia 6
AR - Argentina 5
GE - Georgia 5
IS - Islanda 5
PA - Panama 5
AE - Emirati Arabi Uniti 4
BJ - Benin 4
CI - Costa d'Avorio 4
CY - Cipro 4
GH - Ghana 4
KE - Kenya 4
MK - Macedonia 4
MU - Mauritius 4
SC - Seychelles 4
CR - Costa Rica 3
EC - Ecuador 3
KH - Cambogia 3
KZ - Kazakistan 3
MQ - Martinica 3
PE - Perù 3
SK - Slovacchia (Repubblica Slovacca) 3
AM - Armenia 2
AZ - Azerbaigian 2
BA - Bosnia-Erzegovina 2
CO - Colombia 2
DO - Repubblica Dominicana 2
DZ - Algeria 2
ET - Etiopia 2
IM - Isola di Man 2
IQ - Iraq 2
JO - Giordania 2
KG - Kirghizistan 2
NP - Nepal 2
TM - Turkmenistan 2
TN - Tunisia 2
AF - Afghanistan, Repubblica islamica di 1
BH - Bahrain 1
Totale 24.593
Città #
Woodbridge 1.958
Fairfield 1.419
Warsaw 1.050
Chandler 998
Ann Arbor 903
Houston 897
Jacksonville 845
Ashburn 753
Seattle 640
Dublin 559
Cambridge 502
Wilmington 501
Singapore 450
Mestre 275
Nanjing 259
Jinan 238
Hong Kong 209
Dearborn 191
Boardman 184
Shenyang 184
Guangzhou 176
San Mateo 162
Venice 155
New York 153
Beijing 150
Venezia 147
Council Bluffs 133
Andover 125
Hebei 120
Izmir 113
Montreal 109
Tianjin 95
Boston 93
Las Vegas 91
Changsha 86
Mülheim 83
El Cajon 81
Princeton 81
Taiyuan 81
Vienna 80
Hangzhou 79
Nanchang 75
Ottawa 73
Ningbo 65
Zhengzhou 64
San Diego 63
Haikou 62
Milan 59
Helsinki 58
Taizhou 57
Jiaxing 54
Brandenburg 53
Lexington 53
London 53
Hewlett 51
Denton 48
Los Angeles 48
Moscow 48
Fuzhou 47
Brussels 45
Redwood City 45
St Petersburg 45
Berlin 41
Saint Petersburg 41
Philadelphia 40
The Dalles 39
Amsterdam 36
Beauharnois 36
Krakow 36
Tokyo 35
Des Moines 34
Polesovice 33
Brownsville 32
Polska 32
Bremen 31
Toronto 31
Davao City 30
Frankfurt am Main 30
Santa Clara 29
Strasbourg 29
Johannesburg 27
Madrid 27
Altamura 26
Flushing 26
Ravenna 25
Rome 25
Washington 25
Hefei 24
Kunming 24
Kyiv 24
Cuges-les-Pins 23
Nuremberg 21
Sofia 20
Verona 20
San Paolo di Civitate 19
Norwalk 18
Zurich 18
Chicago 17
Dong Ket 17
Istanbul 17
Totale 17.632
Nome #
CookiExt: Patching the browser against session hijacking attacks 4.198
Affine Refinement Types for Secure Distributed Programming 599
Semantics-based analysis of content security policy deployment 551
A Supervised Learning Approach to Protect Client Authentication on the Web 539
Behavioural equivalences and interference metrics for mobile ad-hoc networks 534
Sub-session hijacking on the web: Root causes and prevention 497
Fine-grained Detection of Privilege Escalation Attacks on Browser Extensions 434
Formal methods for web security 422
Designing Casanova: a language for games 385
Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild 384
Lintent: Towards Security Type-Checking of Android Applications 369
Security protocol specification and verification with AnBx 365
Model Checking Adaptive Service Compositions 354
Channel Abstractions for Network Security 351
Writing real-time .Net games in Casanova 332
CCSP: Controlled relaxation of content security policies by runtime policy composition 330
A formal specification for Casanova, a language for computer games 321
Secrecy and Authenticity Types for Secure Distributed Messaging 318
Provably Sound Browser-Based Enforcement of Web Session Integrity 301
Dr Cookie and Mr Token - Web session implementations and how to live with them 298
A Type System for Discretionary Access Control 293
Client Side Web Session Integrity as a Non-Interference Property 292
Static Detection of Collusion Attacks in ARBAC-based Workflow Systems 292
A compilation technique to increase X3D performance and safety 291
Quite a mess in my cookie jar! Leveraging machine learning to protect web authentication 290
Type-Flow Analysis for Legacy Cobol Code 288
Gran: model checking grsecurity RBAC policies 283
Semantically Sound Analysis of Content Security Policies 280
Automatic and robust client-side protection for cookie-based sessions 274
A Survey of Name-Passing Calculi and Crypto-Primitives 265
Compositional Typed Analysis of ARBAC Policies 265
Typing Legacy COBOL Code 255
Casanova: a declarative language for safe games 251
Interference-sensitive Preorders for MANETs 245
Formal verification of Liferay RBAC 242
Analysis of Typed Analyses of Authentication Protocols 239
Affine Refinement Types for Authentication and Authorization 237
Behavioural typing for safe ambients 236
Authenticity by tagging and typing 233
A Calculus of Bounded Capacities 225
Logical Foundations of Secure Resource Management in Protocol Implementations 223
Reasoning about Security in Mobile Ambients 218
Object Calculi in Linear Logic 214
Compliance Preorders for Web Services. 213
Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II 209
Differential logic programs: Programming methodologies and semantics 208
Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols 203
Static vs Dynamic Typing for Access Control in Pi-Calculus 202
Typed Interpretations of Extensible Objects 201
Language Based Secure Communication 201
A subtyping for Extensible Incomplete Objects 201
Principles for Entity Authentication 199
Secrecy in Untrusted Networks 198
Boxed Ambients 197
Testing for Integrity Flaws in Web Sessions 197
A Theory of Adaptable Contract-based Service Composition. 193
Compositional Analysis of Authentication Protocols 191
Information Flow Security for Boxed Ambients 191
Subtyping and Matching for Mobile Objects 188
Type Based Discretionary Access Control 186
Non-Interference Proof Techniques for the Analysis of Cryptographic Protocols 186
Matching for the Lambda Calculus of Objects 186
Context-Sensitive Equivalences for Non-Interference based Protocol Analysis 178
Security Abstractions and Intruder Models 176
Abstractions for Distributed Protocol Design 172
Secure implementations of typed channel abstractions 171
Typed Processes in Untyped Contexts 170
Access Control for Mobile Agents: the Calculus of Boxed Ambients 168
Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part I 167
An overview of Boxed Ambients 165
Dynamic Types for Authentication 165
Type Inference for Variant Object Types 161
Monadic Scripting in F# for Computer Games 160
Typed Mobile Objects 159
On Casanova and databases or the similarity between games and DBs 158
Space-aware ambients and processes 156
Communication and Mobility Control in Boxed Ambients 149
Secure Safe Ambients 139
Second Workshop on Object Oriented Developments (WOOD 2004) 133
Cryptographic Web Applications: from Security Engineering to Formal Analysis 132
First Workshop on Object Oriented Developments (WOOD 2003) 130
Communication Interference in Mobile Boxed Ambient 116
Fostering SMEs Digital Innovation through Advanced Training and Design Thinking. Italy as a Case Study 101
UNA REPUBBLICA DA DIGITALIZZARE 81
Short Circuits 4.0- How to Connect Business and Higher Technical Education 80
ALGOMOVE – A Move Embedding for Algorand 56
Smart contract languages: A comparative analysis 42
Totale 25.048
Categoria #
all - tutte 76.755
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 76.755


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020372 0 0 0 0 0 0 0 0 0 0 209 163
2020/20214.013 191 116 243 155 494 579 451 207 222 488 518 349
2021/20223.148 381 456 264 452 245 47 126 62 41 313 523 238
2022/20233.752 162 240 70 414 530 821 149 331 376 143 335 181
2023/20242.577 215 213 152 227 262 304 176 222 151 188 266 201
2024/20252.445 162 181 233 262 205 147 256 271 355 279 94 0
Totale 25.048