MERLO, ALESSIO
MERLO, ALESSIO
2GesturePIN: Securing PIN-Based Authentication on Smartwatches
2019-01-01 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A bio-inspired approach to attack graphs analysis
2018-01-01 Conti, V.; Ruffo, S. S.; Merlo, A.; Migliardi, M.; Vitabile, S.
A Comparative Performance Evaluation of DNS Tunneling Tools
2011-01-01 Merlo, Alessio; Gianluca, Papaleo; Stefano, Veneziano; Maurizio, Aiello
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices
2015-01-01 Guerar, Meriem; Migliardi, Mauro; Merlo, Alessio; Benmohammed, Mohamed; Messabih, Belhadri
A cooperative model for resource sharing on grid
2011-01-01 Merlo, Alessio
A Data Anonymization Methodology for Security Operations Centers: Balancing Data Protection and Security in Industrial Systems
2024-01-01 Longo, Giacomo; Lupia, Francesco; Merlo, Alessio; Pagano, Francesco; Russo, Enrico
A Denial of Service Attack to GSM Networks via Attach Procedure
2013-01-01 Nicola, Gobbo; Merlo, Alessio; Migliardi, Mauro
A denial of service attack to umts networks using sim-less devices
2014-01-01 Merlo, Alessio; Migliardi, Mauro; N., Gobbo; F., Palmieri; A., Castiglione
A distributed approach for structured resource discovery on Grid
2008-01-01 Clematis, A.; Corana, A.; D'Agostino, D.; Gianuzzi, Vittoria; Merlo, Alessio; Quarati, A.
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing
2020-01-01 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks
2013-01-01 Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
2023-01-01 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows
2023-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
A secure cloud-edges computing architecture for metagenomics analysis
2019-01-01 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing
2014-01-01 Migliardi, Mauro; Merlo, Alessio; L., Caviglione
A survey on energy-aware security mechanisms
2015-01-01 Merlo, Alessio; Migliardi, Mauro; Caviglione, Luca
A Taxonomy-based Model of Security and Privacy in Online Social Networks
2014-01-01 Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio
Adversarial waypoint injection attacks on Maritime Autonomous Surface Ships (MASS) collision avoidance systems
2024-01-01 Longo, G.; Martelli, M.; Russo, E.; Merlo, A.; Zaccone, R.
Alice in (Software Supply) Chains: Risk Identification and Evaluation
2022-01-01 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
An Empirical Evaluation of the Android Security Framework
2013-01-01 Armando, Alessandro; Merlo, Alessio; Verderame, Luca