D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 88 Citations 31,311 245 World Ranking 291 National Ranking 177

Research.com Recognitions

Awards & Achievements

2019 - ACM Fellow For contributions to improving the security of the Internet and combating cybercrime

2009 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

Giovanni Vigna mostly deals with Computer security, Intrusion detection system, Web application, Data mining and Anomaly-based intrusion detection system. His Computer security research integrates issues from The Internet, Scripting language and Cutwail botnet. His Intrusion detection system study incorporates themes from Web server, Network security, False positive paradox and System call.

Web application is a subfield of World Wide Web that Giovanni Vigna studies. Giovanni Vigna interconnects Exploit and Class in the investigation of issues within World Wide Web. His Data mining research is multidisciplinary, incorporating elements of Structure, Control flow graph, Executable and Algorithm.

His most cited work include:

  • Understanding code mobility (1137 citations)
  • Detecting spammers on social networks (600 citations)
  • Anomaly detection of web-based attacks (537 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Intrusion detection system, World Wide Web, Malware and The Internet. His research in Computer security is mostly focused on Exploit. His research on Intrusion detection system concerns the broader Data mining.

His World Wide Web study is mostly concerned with Web page and Spamming. His Malware study integrates concerns from other disciplines, such as Machine learning and Artificial intelligence. His Web application research is multidisciplinary, relying on both Web threat, Cross-site scripting, Web application security, JavaScript and Scripting language.

He most often published in these fields:

  • Computer security (47.31%)
  • Intrusion detection system (15.77%)
  • World Wide Web (15.77%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (47.31%)
  • Malware (15.41%)
  • Android (6.81%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Malware, Android, Software and Static analysis. He has included themes like The Internet, Internet privacy and Social network in his Computer security study. His study focuses on the intersection of Malware and fields such as Machine learning with connections in the field of Search algorithm.

His Software research includes elements of Vulnerability assessment, Distributed computing and Code. The concepts of his Static analysis study are interwoven with issues in Embedded system, Executable, Firmware and Symbolic execution. His biological study spans a wide range of topics, including Computer network and Cloud computing.

Between 2015 and 2021, his most popular works were:

  • Driller: Augmenting Fuzzing Through Selective Symbolic Execution. (413 citations)
  • SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis (364 citations)
  • Drammer: Deterministic Rowhammer Attacks on Mobile Platforms (168 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Giovanni Vigna mainly focuses on Computer security, Android, Fuzz testing, Internet privacy and Data science. His research in Computer security intersects with topics in IPv4 address exhaustion, Information technology and Social network. The study incorporates disciplines such as x86 and Static analysis in addition to Android.

His Fuzz testing study combines topics in areas such as Boundary and Computer graphics. His Internet privacy study combines topics from a wide range of disciplines, such as Social media, Online harassment and Peer-to-peer. Giovanni Vigna combines subjects such as Vulnerability assessment, Software system and Software security assurance with his study of Data science.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Understanding code mobility

A. Fuggetta;G.P. Picco;G. Vigna.
IEEE Transactions on Software Engineering (1998)

1837 Citations

Anomaly detection of web-based attacks

Christopher Kruegel;Giovanni Vigna.
computer and communications security (2003)

850 Citations

Detecting spammers on social networks

Gianluca Stringhini;Christopher Kruegel;Giovanni Vigna.
annual computer security applications conference (2010)

837 Citations

Your botnet is my botnet: analysis of a botnet takeover

Brett Stone-Gross;Marco Cova;Lorenzo Cavallaro;Bob Gilbert.
computer and communications security (2009)

805 Citations

Detection and analysis of drive-by-download attacks and malicious JavaScript code

Marco Cova;Christopher Kruegel;Giovanni Vigna.
the web conference (2010)

739 Citations

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.

Philipp Vogt;Florian Nentwich;Nenad Jovanovic;Engin Kirda.
network and distributed system security symposium (2007)

672 Citations

Comprehensive approach to intrusion detection alert correlation

F. Valeur;G. Vigna;C. Kruegel;R.A. Kemmerer.
IEEE Transactions on Dependable and Secure Computing (2004)

651 Citations

Intrusion detection: a brief history and overview

R.A. Kemmerer;G. Vigna.
IEEE Computer (2002)

580 Citations

STATL: an attack language for state-based intrusion detection

Steven T. Eckmann;Giovanni Vigna;Richard A. Kemmerer.
Journal of Computer Security (2002)

558 Citations

Polymorphic worm detection using structural information of executables

Christopher Kruegel;Engin Kirda;Darren Mutz;William Robertson.
recent advances in intrusion detection (2005)

521 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Giovanni Vigna

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 62

Engin Kirda

Engin Kirda

Northeastern University

Publications: 56

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 55

Thorsten Holz

Thorsten Holz

Ruhr University Bochum

Publications: 52

Peng Liu

Peng Liu

Chinese Academy of Sciences

Publications: 52

Salvatore J. Stolfo

Salvatore J. Stolfo

Columbia University

Publications: 49

Konrad Rieck

Konrad Rieck

Technische Universität Braunschweig

Publications: 44

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 44

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 42

Dawn Song

Dawn Song

University of California, Berkeley

Publications: 42

Antonio Corradi

Antonio Corradi

University of Bologna

Publications: 41

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 40

Davide Balzarotti

Davide Balzarotti

EURECOM

Publications: 38

Benjamin Livshits

Benjamin Livshits

Imperial College London

Publications: 38

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 38

Frank Piessens

Frank Piessens

KU Leuven

Publications: 35

Something went wrong. Please try again later.