Name
Affiliation
Papers
FEDERICO MAGGI
NECSTLab, PoliMi, Italy
60
Collaborators
Citations 
PageRank 
113
524
37.68
Referers 
Referees 
References 
1546
1172
629
Search Limit
1001000
Title
Citations
PageRank
Year
A simple pre-factor for contaminant biodegradation potential and its application to pesticides risk assessment00.342020
Detecting Insecure Code Patterns in Industrial Robot Programs00.342020
Influential sources of uncertainty in glyphosate biochemical degradation in soil00.342020
Security of controlled manufacturing systems in the connected factory: the case of industrial robots10.372019
BRTSim, a general-purpose computational solver for hydrological, biogeochemical, and ecosystem dynamics.00.342019
Security Evaluation of a Banking Fraud Analysis System.00.342018
Investigating Web Defacement Campaigns at Large.10.392018
Fraudbuster: Temporal Analysis And Detection Of Advanced Financial Frauds00.342018
A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks.50.542017
An Experimental Security Analysis of an Industrial Robot Controller100.802017
fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations.00.342017
Prometheus: Analyzing WebInject-based information stealers.30.412017
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.00.342017
Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks10.392017
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery.00.342017
On the Privacy and Security of the Ultrasound Ecosystem.30.482017
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology.50.452017
ShieldFS: a self-healing, ransomware-aware filesystem.311.532016
DroydSeuss: A Mobile Banking Trojan Tracker (Short Paper).00.342016
On-chip system call tracing: A feasibility study and open prototype.00.342016
GreatEatlon: Fast, Static Detection of Mobile Ransomware.00.342016
Xss Peeker: Dissecting The Xss Exploitation Techniques And Fuzzing Mechanisms Of Blackbox Web Application Scanners10.352016
BankSealer: A decision support system for online banking fraud analysis and investigation70.512015
Scalable Testing of Mobile Antivirus Applications10.352015
Powerslave: Analyzing the Energy Consumption of Mobile Antivirus Software40.402015
HelDroid: Dissecting and Detecting Mobile Ransomware.372.342015
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications60.412015
Face/Off: Preventing Privacy Leakage From Photos in Social Networks240.762015
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries50.412015
Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication70.472014
PuppetDroid: A User-Centric UI Exerciser for Automatic Dynamic Analysis of Similar Android Applications.110.512014
Black-box forensic and antiforensic characteristics of solid-state drives.00.342014
Stranger danger: exploring the ecosystem of ad-based URL shortening services160.832014
Security and Privacy Measurements in Social Networks: Experiences and Lessons Learned00.342014
A Practical Attack Against a KNX-based Building Automation System10.362014
Phoenix: Dga-Based Botnet Tracking And Intelligence471.582014
Andradar: Fast Discovery Of Android Applications In Alternative Markets220.922014
BitIodine: Extracting Intelligence from the Bitcoin Network.181.472014
Two years of short URLs internet measurement: security threats and countermeasures231.112013
Tracking and Characterizing Botnets Using Automatically Generated Domains.80.622013
A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth.20.372013
A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives30.442013
AndroTotal: a flexible, scalable toolbox and service for testing mobile malware detectors221.022013
Lines of malicious code: insights into the malicious software industry190.702012
All your face are belong to us: breaking Facebook's social authentication150.792012
A social-engineering-centric data collection initiative to study phishing10.362011
Finding non-trivial malware naming inconsistencies161.032011
BURN: baring unknown rogue networks.70.472011
Systems Security Research at Politecnico di Milano00.342011
Poster: fast, automatic iPhone shoulder surfing60.722011
  • 1
  • 2