MERLO, ALESSIO
 Distribuzione geografica
Continente #
EU - Europa 12.868
Totale 12.868
Nazione #
IT - Italia 12.868
Totale 12.868
Città #
Genova 10.474
Rapallo 1.224
Genoa 1.137
Bordighera 19
Vado Ligure 14
Totale 12.868
Nome #
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 2.473
Using Screen Brightness to Improve Security in Mobile Social Network Access 159
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications 156
Formal modeling and automatic enforcement of Bring Your Own Device policies 148
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture 147
GridWalker: a visual tool for supporting the advanced discovery of Grid resources 147
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 144
Automatic security verification of mobile app configurations 143
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 141
Managing Networks of Mobiles Entities using the HyVonNe P2P Architecture 138
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks 138
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications 135
An Empirical Evaluation of the Android Security Framework 130
A Denial of Service Attack to GSM Networks via Attach Procedure 128
SortGrid: a Grid Framework compliant with Soft Real Time Requirements 127
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT 126
Android vs. SEAndroid: An empirical assessment 124
A Comparative Performance Evaluation of DNS Tunneling Tools 123
A denial of service attack to umts networks using sim-less devices 122
Measuring and estimating power consumption in Android to support energy-based intrusion detection 122
Developing a NATO BYOD security policy 118
Trustworthy Opportunistic Access to the Internet of Services 117
Trusted host-based card emulation 117
Reducing the impact of traffic sanitization on latency sensitive applications 116
SoRTSim: A high-level simulator for the evaluation of QoS models on Grid 115
Formal Modeling and Reasoning about the Android Security Framework 115
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 114
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 114
Social Network Engineering for Secure Web Data and Services 113
A survey on energy-aware security mechanisms 113
A Taxonomy-based Model of Security and Privacy in Online Social Networks 110
A distributed approach for structured resource discovery on Grid 110
Balancing Delays and Energy Consumption in IPS-Enabled Networks 109
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4 108
Performance assessment and analysis of DNS tunneling tools 108
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices 107
On Social Network Engineering for Secure Web Data and Services 106
Security considerations related to the use of mobile devices in the operation of critical infrastructures 106
Generating statistical insights into network behavior using SKETURE 106
Towards energy-aware intrusion detection systems on mobile devices 105
Enabling BYOD through secure meta-market 105
Android Permissions Unleashed 105
Phishing attacks on modern android 104
IPS-based reduction of network energy consumption 103
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices 103
The energy impact of security mechanisms in modern mobile devices 102
Breaking and fixing the Android Launching Flow 102
Reducing energy consumption in prospective memory support system through hierarchical positioning algorithm 101
Covert channels in IoT deployments through data hiding techniques 101
SoRTSim: A High-Level Simulator for the Evaluation of QoS Models on Grid 99
On the Feasibility of Moderating a Peer-To-Peer CDN System: A Proof-of-Concept Implementation 98
Behavioral Anomaly Detection in Forensics Analysis 98
Low-Resource Footprint, Data-Driven Malware Detection on Android 95
Optimizing Network Energy Consumption through Intrusion Prevention Systems 95
Formal Analysis of a Privacy-Preserving Billing Protocol 94
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches 93
Modeling the energy consumption of Distributed IDS: a step towards Green Security 93
On energy-based profiling of malware in Android 93
Bring your own device, securely 93
Riskindroid: Machine Learning-Based risk analysis on Android 93
Dynamic latency sensitivity recognition: An application to energy saving 93
On Re-use of randomness in broadcast encryption 91
Securing the ``Bring Your Own Device'' Paradigm 91
On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks 91
Mobile App Security Analysis with the MAVeriC Static Analysis Module 90
Quality of Service on Grid: Architectural and methodological issues 89
Mobile app security assessment with the maveric dynamic analysis module 89
RmPerm: A Tool for Android Permissions Removal 88
HPC & Co strike back: Where are distributed paradigms heading toward? 84
BYODCert: Toward a cross-organizational BYOD paradigm 84
null 83
Cooperative Access Control for the Grid 83
Securing the “bring your own device” policy 81
Anomaly Detection in Computer Networks: A State-of-the-Art Review 81
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem 81
From HPC to security: How to change research focus and survive - A career perspective 81
A bio-inspired approach to attack graphs analysis 80
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition 76
Market-based security for mobile devices 75
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 75
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 75
A cooperative model for resource sharing on grid 74
Using ETC framework in virtual laboratories for online students 73
Green-Aware Security: Towards a New Research Field 72
Automated Security Analysis of IoT Software Updates 71
FLEX: A flexible code authentication framework for delegating mobile app customization 69
null 68
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 68
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 65
Blockchain-based risk mitigation for invoice financing 65
Droids in disarray: Detecting frame confusion in hybrid android apps 64
Securing PIN-based authentication in smartwatches with just two gestures 64
Improving energy efficiency in distributed intrusion detection systems 60
SKETURE: A sketch-based packet analysis tool 59
The Workshops of the 5thIEEE European Symposium on Security and Privacy - Preface 57
A secure cloud-edges computing architecture for metagenomics analysis 57
What is Green Security? 56
Towards Policy-Driven Monitoring of Fog Applications 56
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks 54
Dispositivi mobili: nuovi problemi di sicurezza 53
Totale 12.234
Categoria #
all - tutte 36.528
article - articoli 12.713
book - libri 0
conference - conferenze 17.677
curatela - curatele 284
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 5.854
Totale 73.056


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202.874 119 90 116 161 206 269 375 188 287 532 391 140
2020/20213.674 95 69 152 89 51 149 647 913 764 549 97 99
2021/20221.493 25 101 161 147 79 87 128 311 80 148 70 156
2022/20231.510 139 110 27 97 206 273 17 138 310 10 146 37
2023/2024894 57 109 36 115 55 181 55 43 21 23 94 105
2024/202535 35 0 0 0 0 0 0 0 0 0 0 0
Totale 13.067