MERLO, ALESSIO

MERLO, ALESSIO  

Mostra records
Risultati 1 - 20 di 134 (tempo di esecuzione: 0.043 secondi).
Titolo Data di pubblicazione Autore(i) File
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 1-gen-2019 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A bio-inspired approach to attack graphs analysis 1-gen-2018 Conti, V.; Ruffo, S. S.; Merlo, A.; Migliardi, M.; Vitabile, S.
A Comparative Performance Evaluation of DNS Tunneling Tools 1-gen-2011 Merlo, Alessio; Gianluca, Papaleo; Stefano, Veneziano; Maurizio, Aiello
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices 1-gen-2015 Guerar, Meriem; Migliardi, Mauro; Merlo, Alessio; Benmohammed, Mohamed; Messabih, Belhadri
A cooperative model for resource sharing on grid 1-gen-2011 Merlo, Alessio
A Data Anonymization Methodology for Security Operations Centers: Balancing Data Protection and Security in Industrial Systems 1-gen-2024 Longo, Giacomo; Lupia, Francesco; Merlo, Alessio; Pagano, Francesco; Russo, Enrico
A Denial of Service Attack to GSM Networks via Attach Procedure 1-gen-2013 Nicola, Gobbo; Merlo, Alessio; Migliardi, Mauro
A denial of service attack to umts networks using sim-less devices 1-gen-2014 Merlo, Alessio; Migliardi, Mauro; N., Gobbo; F., Palmieri; A., Castiglione
A distributed approach for structured resource discovery on Grid 1-gen-2008 Clematis, A.; Corana, A.; D'Agostino, D.; Gianuzzi, Vittoria; Merlo, Alessio; Quarati, A.
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 1-gen-2020 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks 1-gen-2013 Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case 1-gen-2023 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows 1-gen-2023 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
A secure cloud-edges computing architecture for metagenomics analysis 1-gen-2019 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 1-gen-2014 Migliardi, Mauro; Merlo, Alessio; L., Caviglione
A survey on energy-aware security mechanisms 1-gen-2015 Merlo, Alessio; Migliardi, Mauro; Caviglione, Luca
A Taxonomy-based Model of Security and Privacy in Online Social Networks 1-gen-2014 Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio
Adversarial waypoint injection attacks on Maritime Autonomous Surface Ships (MASS) collision avoidance systems 1-gen-2024 Longo, G.; Martelli, M.; Russo, E.; Merlo, A.; Zaccone, R.
Alice in (Software Supply) Chains: Risk Identification and Evaluation 1-gen-2022 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
An Empirical Evaluation of the Android Security Framework 1-gen-2013 Armando, Alessandro; Merlo, Alessio; Verderame, Luca