FOCARDI, Riccardo
 Distribuzione geografica
Continente #
NA - Nord America 23.023
EU - Europa 12.312
AS - Asia 11.109
SA - Sud America 836
AF - Africa 318
OC - Oceania 39
Continente sconosciuto - Info sul continente non disponibili 26
AN - Antartide 1
Totale 47.664
Nazione #
US - Stati Uniti d'America 21.933
CN - Cina 4.260
SG - Singapore 3.114
IT - Italia 2.413
PL - Polonia 2.245
DE - Germania 1.604
VN - Vietnam 1.180
GB - Regno Unito 1.057
CA - Canada 992
UA - Ucraina 840
IE - Irlanda 815
BR - Brasile 654
RU - Federazione Russa 654
FI - Finlandia 557
SE - Svezia 533
HK - Hong Kong 494
FR - Francia 424
JP - Giappone 377
IN - India 357
KR - Corea 353
AT - Austria 267
TR - Turchia 222
NL - Olanda 198
ZA - Sudafrica 108
PH - Filippine 94
CH - Svizzera 82
ES - Italia 79
DK - Danimarca 75
BD - Bangladesh 67
CZ - Repubblica Ceca 65
ID - Indonesia 65
BE - Belgio 63
MX - Messico 61
MA - Marocco 55
JO - Giordania 54
AR - Argentina 53
BG - Bulgaria 53
MY - Malesia 53
IQ - Iraq 52
PK - Pakistan 42
RO - Romania 42
TH - Thailandia 39
IR - Iran 38
TW - Taiwan 37
AU - Australia 34
RS - Serbia 32
SA - Arabia Saudita 32
MD - Moldavia 30
PT - Portogallo 30
UZ - Uzbekistan 30
GR - Grecia 28
CL - Cile 27
EG - Egitto 26
VE - Venezuela 26
IL - Israele 25
EU - Europa 23
EC - Ecuador 22
LT - Lituania 20
NO - Norvegia 20
CO - Colombia 18
KE - Kenya 18
SI - Slovenia 18
UY - Uruguay 16
BJ - Benin 15
TN - Tunisia 15
DZ - Algeria 12
LB - Libano 12
NG - Nigeria 12
NP - Nepal 12
BY - Bielorussia 11
HR - Croazia 11
AE - Emirati Arabi Uniti 10
AZ - Azerbaigian 10
OM - Oman 10
HU - Ungheria 9
QA - Qatar 9
GE - Georgia 8
CM - Camerun 7
DO - Repubblica Dominicana 7
KZ - Kazakistan 7
PS - Palestinian Territory 7
PY - Paraguay 7
BO - Bolivia 6
CI - Costa d'Avorio 6
CY - Cipro 6
LU - Lussemburgo 6
MU - Mauritius 6
PE - Perù 6
AO - Angola 5
CR - Costa Rica 5
GH - Ghana 5
KH - Cambogia 5
NZ - Nuova Zelanda 5
PA - Panama 5
AL - Albania 4
BA - Bosnia-Erzegovina 4
BH - Bahrain 4
ET - Etiopia 4
HN - Honduras 4
IS - Islanda 4
Totale 47.576
Città #
Woodbridge 2.645
Ashburn 2.211
Warsaw 1.980
Fairfield 1.925
Singapore 1.725
Chandler 1.370
Jacksonville 1.303
Ann Arbor 1.120
Houston 1.037
Seattle 846
Dublin 809
San Jose 695
Wilmington 662
Cambridge 644
Dearborn 540
Munich 503
Dallas 485
Montréal 471
Hong Kong 434
Mcallen 423
Beijing 378
Nanjing 361
Ho Chi Minh City 345
Guangzhou 339
Jinan 331
New York 327
Boardman 307
Venice 299
Mestre 298
Shenyang 294
Hefei 293
Hanoi 289
Seoul 268
Council Bluffs 255
Venezia 248
Tokyo 228
Vienna 227
Los Angeles 179
Izmir 177
Boston 170
The Dalles 164
Bengaluru 163
San Mateo 155
Andover 153
Ottawa 151
Montreal 144
Hebei 142
Tianjin 139
Princeton 137
Mülheim 136
Lauterbourg 134
Parma 126
Changsha 116
Des Moines 110
Santa Clara 109
Buffalo 108
San Diego 108
Taiyuan 107
Frankfurt am Main 105
Zhengzhou 105
Polska 104
Toronto 101
Hangzhou 100
Berlin 98
Taizhou 95
Las Vegas 94
Moscow 94
Nanchang 93
Jiaxing 90
Helsinki 88
Johannesburg 85
Haikou 84
Milan 84
Ningbo 83
El Cajon 81
London 75
Verona 75
Fuzhou 69
Saint Petersburg 67
Amsterdam 61
Redwood City 61
Altamura 59
Columbus 57
Chicago 56
São Paulo 56
Brandenburg 55
Kraków 54
Lexington 53
Da Nang 51
Hewlett 51
St Petersburg 49
Denton 48
Casablanca 47
Philadelphia 45
Rome 45
Brussels 43
Nuremberg 42
Haiphong 41
San Paolo di Civitate 41
Washington 39
Totale 32.767
Nome #
CookiExt: Patching the browser against session hijacking attacks 5.174
First Italian Conference on Cybersecurity 2.009
Mind Your Keys? A Security Evaluation of Java Keystores 704
Shaping the Glitch: Optimizing Voltage Fault Injection Attacks 562
Usable Cryptographic QR Codes 554
Run-time analysis of PKCS#11 attacks 546
Surviving the Web: A Journey into Web Session Security 537
APDU-Level Attacks in PKCS#11 Devices 518
Security Threats and Solutions for Two-Dimensional Barcodes: A Comparative Study 512
Firewall management with FireWall synthesizer 491
Development of security extensions based on Chrome APIs 489
Match It or Die: Proving Integrity by Equality 487
Formal methods for web security 485
Gathering of robots in a ring with mobile faults 480
Formal Analysis of Key Integrity in PKCS#11 447
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem 447
Mignis: A semantic based tool for firewall configuration 429
Localizing Firewall Security Policies 423
A calculus of challenges and responses 411
Channel Abstractions for Network Security 408
Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities 405
Gathering of robots in a ring with mobile faults 402
Language-Independent Synthesis of Firewall Policies 402
Provably Sound Browser-Based Enforcement of Web Session Integrity 394
A Classification of Security Properties for Process Algebras 391
Transcompiling Firewalls 391
A modular approach to Sprouts 389
Usable security for QR code 385
Automatic and robust client-side protection for cookie-based sessions 377
Run-Time Attack Detection in Cryptographic APIs 377
Micro-Policies for Web Session Security 371
Efficient Padding Oracle Attacks on Cryptographic Hardware 367
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients 365
Gran: model checking grsecurity RBAC policies 361
A Survey of Name-Passing Calculi and Crypto-Primitives 354
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring 350
Practical Padding Oracle Attacks on RSA 349
Fast SQL Blind Injections in High Latency Networks. 346
An Introduction to Security API Analysis 337
A Proof System for Information Flow Security 328
Analysing Sprouts 325
A semantic based tool for firewall configuration 322
Getting to know your card: Reverse-engineering the smart-card application protocol data unit 320
Secure your PKCS#11 token against API attacks! 318
BANANA: A tool for Boundary Ambients Nesting ANAlysis 317
Authenticity by tagging and typing 316
A hard lesson: Assessing the HTTPS deployment of Italian university websites 316
Automated Analysis of PUF-based Protocols 313
Analysis of Typed Analyses of Authentication Protocols 311
Fixing PKCS#11 by key-diversification 309
Bisimulation and Unwinding for Verifying Possibilistic Security Properties 308
FWS: Analyzing, maintaining and transcompiling firewalls 302
Type-Based Analysis of PKCS#11 Key Management 300
A Comparison of Three Authentication Properties 298
Localizing Security for Distributed Firewalls 294
A new analysis technique for the Sprouts Game 290
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties 289
Complexity of Nesting Analysis in Mobile Ambients 281
Guessing Bank PINs by Winning a Mastermind Game 281
Machine Learning for Web Vulnerability Detection: The Case of Cross-Site Request Forgery 281
A Compiler for Analysing Cryptographic Protocols Using Non-Interference 277
Type-Based Analysis of Generic Key Management APIs 276
Types for security protocols 276
Feedback Vertex Set in Hypercubes 275
Type-Based Analysis of PIN Processing APIs 275
A Security Property for Processes in Dynamic Contexts 272
Information Leakage Detection in Boundary Ambients 272
Analysis and development of Security APIs for disposable RFID tickets 270
Language-Based Web Session Integrity 269
Authentication primitives for secure protocol specifications 269
Boundary Inference for Enforcing Security Policies in Mobile Ambients 268
Unwinding in Information Flow Security 267
Information Flow Security in Mobile Ambients 266
Refinement Operators and Information Flow Security 266
Authentication Primitives for Protocol Specifications 259
Type-based Analysis of Key Management in PKCS#11 cryptographic devices 259
Non Interference for the Analysis of Cryptographic Protocols 257
Nesting analysis of mobile ambients 257
Blunting Differential Attacks on PIN Processing APIs 256
Computer Languages and Security 254
Primitives for Authentication in Process Algebras 253
A formally verified configuration for Hardware Security Modules in the cloud 253
Real-Time Information Flow Analysis 250
Information flow security of multi-threaded distributed programs 249
Attacking and Fixing PKCS#11 Security Tokens. 245
A New Definition of Multilevel Security 244
Principles for Entity Authentication 242
Static Analysis of Authentication 241
Language Based Secure Communication 241
Transforming processes to check and ensure Information Flow Security 241
Control Flow Analysis of Mobile Ambients with Security Boundaries 239
Compositional Analysis of Authentication Protocols 235
Bridging the Gap: Automated Analysis of Sancus 234
Bridging Language-Based and Process Calculi Security 234
Minumum Feedback Vertex Set in k-Dimensional Hypercubes 234
Cracking Bank PINs by Playing Mastermind 234
Secure upgrade of hardware security modules in bank networks 232
Verifying Persistent Security Properties. 231
Information Flow Security in Dynamic Contexts 231
Surviving the Web: A Journey into Web Session Security 230
Totale 39.778
Categoria #
all - tutte 139.929
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 139.929


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20211.824 0 0 0 0 0 0 0 0 0 641 664 519
2021/20224.405 506 653 381 555 310 74 178 112 79 508 666 383
2022/20235.111 277 363 86 527 665 1.191 236 409 573 137 426 221
2023/20243.199 255 235 171 238 354 504 242 170 192 223 340 275
2024/20254.374 232 216 353 368 310 236 443 492 473 463 431 357
2025/202610.425 789 879 978 966 1.277 952 1.245 830 1.460 1.049 0 0
Totale 48.332