MERCALDO, Francesco
 Distribuzione geografica
Continente #
EU - Europa 5.110
NA - Nord America 3.089
AS - Asia 917
AF - Africa 514
SA - Sud America 50
OC - Oceania 23
Continente sconosciuto - Info sul continente non disponibili 4
Totale 9.707
Nazione #
US - Stati Uniti d'America 2.997
IE - Irlanda 2.229
IT - Italia 871
RU - Federazione Russa 606
CI - Costa d'Avorio 484
FI - Finlandia 387
SG - Singapore 350
CN - Cina 281
DE - Germania 237
UA - Ucraina 200
SE - Svezia 172
CA - Canada 74
IN - India 72
BE - Belgio 71
FR - Francia 65
GR - Grecia 53
AT - Austria 44
GB - Regno Unito 40
BR - Brasile 35
IR - Iran 35
JP - Giappone 28
NL - Olanda 25
HK - Hong Kong 21
PL - Polonia 19
SI - Slovenia 19
AU - Australia 16
KR - Corea 16
CH - Svizzera 14
MX - Messico 14
PK - Pakistan 14
MY - Malesia 13
RO - Romania 13
TR - Turchia 12
LT - Lituania 11
ID - Indonesia 8
NZ - Nuova Zelanda 7
LK - Sri Lanka 6
MA - Marocco 6
PH - Filippine 6
PT - Portogallo 6
ES - Italia 5
IL - Israele 5
NO - Norvegia 5
PE - Perù 5
AM - Armenia 4
BD - Bangladesh 4
CM - Camerun 4
CY - Cipro 4
CZ - Repubblica Ceca 4
EC - Ecuador 4
EU - Europa 4
IQ - Iraq 4
KG - Kirghizistan 4
LV - Lettonia 4
TW - Taiwan 4
AZ - Azerbaigian 3
CO - Colombia 3
EG - Egitto 3
HU - Ungheria 3
JO - Giordania 3
PA - Panama 3
SA - Arabia Saudita 3
SZ - Regno dello Swaziland 3
TH - Thailandia 3
VN - Vietnam 3
AE - Emirati Arabi Uniti 2
AO - Angola 2
AR - Argentina 2
BW - Botswana 2
DK - Danimarca 2
DZ - Algeria 2
KE - Kenya 2
LB - Libano 2
NG - Nigeria 2
NP - Nepal 2
QA - Qatar 2
SD - Sudan 2
UZ - Uzbekistan 2
BG - Bulgaria 1
EE - Estonia 1
HR - Croazia 1
IS - Islanda 1
JM - Giamaica 1
LU - Lussemburgo 1
TM - Turkmenistan 1
TN - Tunisia 1
VE - Venezuela 1
ZM - Zambia 1
Totale 9.707
Città #
Dublin 2.229
Chandler 758
Abidjan 484
Jacksonville 386
Baranello 343
Helsinki 333
Singapore 201
Princeton 117
Wilmington 102
Ann Arbor 94
San Mateo 77
Brussels 70
Ashburn 58
Dallas 58
Boardman 57
Dearborn 56
Lappeenranta 54
Beijing 51
Campobasso 45
Ottawa 44
Los Angeles 41
Moscow 39
Vienna 38
Molise 37
Redwood City 31
New York 29
Milan 24
Houston 21
Jinan 19
Rome 18
Nanjing 17
Naples 17
Redmond 17
Tokyo 16
Amsterdam 15
Frankfurt am Main 15
Tianjin 14
Guangzhou 13
Hong Kong 13
Kochi 13
Santa Clara 13
Paris 12
Shiraz 12
Toronto 11
Pune 10
Shanghai 10
Woodbridge 10
Falls Church 9
Mumbai 9
Napoli 9
Shenyang 9
São Paulo 9
Washington 9
Borås 8
Islamabad 8
Kunming 8
Leawood 8
Morcone 8
Nanchang 8
Norwalk 8
Bari 7
Mountain View 7
Seattle 7
Stockholm 7
Sydney 7
Chengdu 6
Gunzenhausen 6
Hangzhou 6
Hebei 6
Lanzhou 6
London 6
Marano di Napoli 6
Melíki 6
Montoro 6
Newark 6
Rumia 6
Taizhou 6
Trezzo 6
Afragola 5
Draveil 5
Falkenstein 5
Jakarta 5
Zhengzhou 5
Andover 4
Bishkek 4
Cambridge 4
Casalciprano 4
Catania 4
Cava 4
Changsha 4
Colchester 4
Columbus 4
Delhi 4
Düsseldorf 4
Guayaquil 4
Hamilton 4
L'aquila 4
Padova 4
Phoenix 4
Pisa 4
Totale 6.458
Nome #
Can machine learning predict soccer match results? 176
Metodo e Sistema di Riconoscimento di un Conducente alla Guida di un Veicolo. 140
Poster: A data life cycle modeling proposal by means of formal methods 108
Cascade Learning for Mobile Malware Families Detection through Quality and Android Metrics 107
Wearable Devices for Human Activity Recognition and User Detection 106
A Formal Methodology for Notational Analysis and Real-Time Decision Support in Sport Environment 98
A blockchain based proposal for protecting healthcare systems through formal methods 95
2Faces: a new model of malware based on dynamic compiling and reflection 93
Diabetes Mellitus Affected Patients "Classification and Diagnosis through Machine Learning Techniques" 92
Talos: No more Ransomware Victims with Formal Methods 90
Radiomic features for prostate cancer grade detection through formal verification 90
Car Hacking Identification through Fuzzy Logic Algorithms 88
Malware and Formal Methods: Rigorous approaches for detecting malicious behaviour 88
null 88
Evaluating model checking for cyber threats code obfuscation identification 86
Measuring Mobile Applications Quality and Security in Higher Education 86
Spyware detection using temporal logic 86
Phylogenetic analysis for ransomware detection and classification into families 85
Model Checking to Detect the Hummingbad Malware 84
Deep learning for image-based mobile malware detection 84
Accidental sensitive data leaks prevention via formal verification 82
Android run-time permission exploitation user awareness by means of formal methods 80
Machine Learning to Identify Gender via Hair Elements 79
Visualizing the outcome of dynamic analysis of Android malware with VizMal 79
Hourly Global Solar Radiation Reconstruction Applying Machine Learning 79
Real-time driver behaviour characterization through rule-based machine learning 78
Investigating mobile applications quality in official and third-party marketplaces 78
A “pay-how-you-drive” car insurance approach through cluster analysis 77
Dynamic mobile malware detection through system call-based image representation 76
Formal Methods for Prostate Cancer Gleason Score and Treatment Prediction using Radiomic Biomarkers 75
Formal Methods for Android Banking Malware Analysis and Detection 75
Android collusion: Detecting malicious applications inter-communication through SharedPreferences 75
LEILA: formaL tool for idEntifying mobIle maLicious behAviour 74
Explainable Deep Learning for Pulmonary Disease and Coronavirus COVID-19 Detection from X-rays 74
A Model Checking based Proposal for Mobile Colluding Attack Detection 74
Colluding Android Apps Detection via Model Checking 74
Real-Time SCADA Attack Detection by Means of Formal Methods 73
Formal modeling for magnetic resonance images tamper mitigation 73
A methodology based on formal methods for thermal ablation area detection 73
Neural Networks for Lung Cancer Detection through Radiomic Features 72
Exploiting supervised machine learning for driver detection in a real-world environment 72
VisualDroid: Automatic triage and detection of Android repackaged applications 72
Model checking based approach for compliance checking 71
Detecting colluding inter-app communication in mobile environment 71
Malicious Collusion Detection in Mobile Environment by means of Model Checking 71
Dunuen: A user-friendly formal verification tool 70
Energy consumption metrics for mobile device dynamic malware detection 68
Exploiting model checking for mobile botnet detection 68
A method for automatic penetration testing and mitigation: A Red Hat approach 68
Mobile family detection through audio signals classification 67
A Methodology for Real-Time Data Verification exploiting Deep Learning and Model Checking 66
Model checking for data anomaly detection 66
Cluster Analysis for Driver Aggressiveness Identification 65
Identifying Mobile Repackaged Applications through Formal Methods 64
Formal Methods Meet Mobile Code Obfuscation 64
Identification of Android Malware Families with Model Checking 64
Anomaly detection in substation networks 64
Twinkle Twinkle Little DroidDream, How I Wonder What You Are? 63
A Semi-Automated Explainability-Driven Approach for Malware Analysis through Deep Learning 63
Download Malware? No, thanks. How Formal Methods can Block Update Attacks 62
BPM perspectives to support ICSs: Exploiting the integration of formal verifications into investment service provision processes 62
SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications 62
Android collusion detection by means of audio signal analysis with machine learning techniques 62
Code Reordering Obfuscation Technique Detection by Means of Weak Bisimulation 61
Machine Learning on Soccer Player Positions 59
Safety Critical Systems Formal Verification Using Execution Traces 59
Model checking for malicious family detection and phylogenetic analysis in mobile environment 59
Social Network Polluting Contents Detection through Deep Learning Techniques 58
Ransomware Steals your Phone. Formal Methods Rescue it 57
Context-Awareness Mobile Devices for Traffic Incident. 57
Who's Driving My Car? A machine learning based approach to driver identification, 57
DECAB-LSTM: Deep Contextualized Attentional Bidirectional LSTM for cancer hallmark classification 57
How Discover a Malware using Model Checking 56
Ransomware Inside Out 55
Deep learning for heart disease detection through cardiac sounds 55
Hey Malware, I can Find You! 53
Radiomic features for medical images tamper detection by equivalence checking 52
D-bridemaid: A distributed framework for collaborative and dynamic analysis of android malware 52
Colluding covert channel for malicious information exfiltration in android environment 52
User Authentication through Keystroke Dynamics by means of Model Checking: A Proposal 51
Radiomics for gleason score detection through deep learning 51
Automated Intention Mining with Comparatively Fine-tuning BERT 51
Prostate gleason score detection and cancer treatment through real-time formal verification 50
Audio signal processing for Android malware detection and family identification 50
Machine learning for coronavirus covid-19 detection from chest x-rays 49
Cognitive computing for big data systems over internet of things for enterprise information systems 49
Explainability of Model Checking for Mobile Malicious Behavior Between Collaborative Apps Detection and Localisation 47
Let's gossip: Exploring malware zero-day time windows by social network analysis 47
A framework for supporting ransomware detection and prevention based on hybrid analysis 45
Explainability of radiomics through formal methods 45
Call graph and model checking for fine-grained android malicious behaviour detection 45
A novel methodology for head and neck carcinoma treatment stage detection by means of model checking 45
Model Checking for Mobile Android Malware Evolution 44
Model checking and machine learning techniques for HummingBad mobile malware detection and mitigation 43
Automatic PI-RADS assignment by means of formal methods 43
Thermal Ablation Treatment Detection by means of Machine Learning 43
On the Adoption of Radiomics and Formal Methods for COVID-19 Coronavirus Diagnosis 42
Bank credit risk management based on data mining techniques 41
Hide and seek game: A machine learning approach for detecting malicious samples in analysis environment 39
CAN-Bus Attack Detection with Deep Learning 39
Totale 6.873
Categoria #
all - tutte 64.338
article - articoli 0
book - libri 0
conference - conferenze 0
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 0
Totale 64.338


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/2020488 0 0 0 0 0 49 143 55 83 38 30 90
2020/2021819 21 69 11 129 98 82 109 31 97 48 102 22
2021/2022741 25 76 10 32 40 48 44 53 93 114 62 144
2022/20234.142 360 136 72 230 142 206 17 254 2.435 138 88 64
2023/20241.380 234 126 58 44 39 98 109 58 25 94 374 121
2024/20252.081 680 207 351 78 695 70 0 0 0 0 0 0
Totale 10.082