MERLO, ALESSIO
 Distribuzione geografica
Continente #
EU - Europa 12.682
Totale 12.682
Nazione #
IT - Italia 12.682
Totale 12.682
Città #
Genova 10.474
Rapallo 1.224
Genoa 964
Bordighera 20
Totale 12.682
Nome #
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 2.464
Using Screen Brightness to Improve Security in Mobile Social Network Access 159
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications 153
Formal modeling and automatic enforcement of Bring Your Own Device policies 147
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture 146
GridWalker: a visual tool for supporting the advanced discovery of Grid resources 146
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 144
Automatic security verification of mobile app configurations 141
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 139
Managing Networks of Mobiles Entities using the HyVonNe P2P Architecture 136
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks 135
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications 134
An Empirical Evaluation of the Android Security Framework 127
SortGrid: a Grid Framework compliant with Soft Real Time Requirements 127
A Denial of Service Attack to GSM Networks via Attach Procedure 124
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT 123
A Comparative Performance Evaluation of DNS Tunneling Tools 121
A denial of service attack to umts networks using sim-less devices 120
Measuring and estimating power consumption in Android to support energy-based intrusion detection 120
Android vs. SEAndroid: An empirical assessment 120
Developing a NATO BYOD security policy 117
Trusted host-based card emulation 117
Reducing the impact of traffic sanitization on latency sensitive applications 116
SoRTSim: A high-level simulator for the evaluation of QoS models on Grid 115
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 114
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 114
Trustworthy Opportunistic Access to the Internet of Services 114
Formal Modeling and Reasoning about the Android Security Framework 113
Social Network Engineering for Secure Web Data and Services 110
A survey on energy-aware security mechanisms 109
Balancing Delays and Energy Consumption in IPS-Enabled Networks 109
A Taxonomy-based Model of Security and Privacy in Online Social Networks 108
A distributed approach for structured resource discovery on Grid 108
Performance assessment and analysis of DNS tunneling tools 108
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4 107
On Social Network Engineering for Secure Web Data and Services 106
Generating statistical insights into network behavior using SKETURE 106
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices 106
Security considerations related to the use of mobile devices in the operation of critical infrastructures 105
Towards energy-aware intrusion detection systems on mobile devices 105
Enabling BYOD through secure meta-market 103
IPS-based reduction of network energy consumption 103
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices 103
Android Permissions Unleashed 103
Phishing attacks on modern android 102
The energy impact of security mechanisms in modern mobile devices 101
Breaking and fixing the Android Launching Flow 100
Reducing energy consumption in prospective memory support system through hierarchical positioning algorithm 100
SoRTSim: A High-Level Simulator for the Evaluation of QoS Models on Grid 98
On the Feasibility of Moderating a Peer-To-Peer CDN System: A Proof-of-Concept Implementation 98
Covert channels in IoT deployments through data hiding techniques 97
Behavioral Anomaly Detection in Forensics Analysis 97
Low-Resource Footprint, Data-Driven Malware Detection on Android 95
Optimizing Network Energy Consumption through Intrusion Prevention Systems 94
On energy-based profiling of malware in Android 93
Formal Analysis of a Privacy-Preserving Billing Protocol 93
Dynamic latency sensitivity recognition: An application to energy saving 93
Modeling the energy consumption of Distributed IDS: a step towards Green Security 92
Riskindroid: Machine Learning-Based risk analysis on Android 92
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches 91
On Re-use of randomness in broadcast encryption 91
Bring your own device, securely 91
Securing the ``Bring Your Own Device'' Paradigm 90
Mobile App Security Analysis with the MAVeriC Static Analysis Module 90
Quality of Service on Grid: Architectural and methodological issues 89
Mobile app security assessment with the maveric dynamic analysis module 89
On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks 89
RmPerm: A Tool for Android Permissions Removal 88
BYODCert: Toward a cross-organizational BYOD paradigm 84
null 83
Cooperative Access Control for the Grid 82
HPC & Co strike back: Where are distributed paradigms heading toward? 82
From HPC to security: How to change research focus and survive - A career perspective 80
Securing the “bring your own device” policy 79
Anomaly Detection in Computer Networks: A State-of-the-Art Review 79
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem 79
A bio-inspired approach to attack graphs analysis 78
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition 76
Market-based security for mobile devices 73
Using ETC framework in virtual laboratories for online students 72
Green-Aware Security: Towards a New Research Field 72
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 72
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 72
Automated Security Analysis of IoT Software Updates 71
A cooperative model for resource sharing on grid 70
null 68
FLEX: A flexible code authentication framework for delegating mobile app customization 68
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 64
Blockchain-based risk mitigation for invoice financing 64
Securing PIN-based authentication in smartwatches with just two gestures 63
Droids in disarray: Detecting frame confusion in hybrid android apps 62
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 61
Improving energy efficiency in distributed intrusion detection systems 59
SKETURE: A sketch-based packet analysis tool 58
What is Green Security? 56
The Workshops of the 5thIEEE European Symposium on Security and Privacy - Preface 56
Towards Policy-Driven Monitoring of Fog Applications 56
A secure cloud-edges computing architecture for metagenomics analysis 55
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks 53
Dispositivi mobili: nuovi problemi di sicurezza 48
Totale 12.093
Categoria #
all - tutte 34.194
article - articoli 11.888
book - libri 0
conference - conferenze 16.532
curatela - curatele 265
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 5.509
Totale 68.388


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2018/2019471 0 0 0 0 0 0 0 0 0 0 260 211
2019/20202.874 119 90 116 161 206 269 375 188 287 532 391 140
2020/20213.674 95 69 152 89 51 149 647 913 764 549 97 99
2021/20221.493 25 101 161 147 79 87 128 311 80 148 70 156
2022/20231.520 139 110 27 97 206 273 18 138 310 10 150 42
2023/2024735 58 110 38 120 57 187 60 45 21 26 13 0
Totale 12.883