MERLO, ALESSIO
 Distribuzione geografica
Continente #
EU - Europa 13.659
Totale 13.659
Nazione #
IT - Italia 13.659
Totale 13.659
Città #
Genova 10.474
Genoa 1.233
Rapallo 1.224
Vado Ligure 703
Bordighera 25
Totale 13.659
Nome #
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 2.479
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications 164
Using Screen Brightness to Improve Security in Mobile Social Network Access 162
Formal modeling and automatic enforcement of Bring Your Own Device policies 157
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture 151
GridWalker: a visual tool for supporting the advanced discovery of Grid resources 151
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 148
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 146
Automatic security verification of mobile app configurations 146
Managing Networks of Mobiles Entities using the HyVonNe P2P Architecture 144
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks 143
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications 142
An Empirical Evaluation of the Android Security Framework 136
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT 135
A Denial of Service Attack to GSM Networks via Attach Procedure 133
SortGrid: a Grid Framework compliant with Soft Real Time Requirements 133
A denial of service attack to umts networks using sim-less devices 128
A Comparative Performance Evaluation of DNS Tunneling Tools 128
Android vs. SEAndroid: An empirical assessment 127
Measuring and estimating power consumption in Android to support energy-based intrusion detection 126
Developing a NATO BYOD security policy 122
Trustworthy Opportunistic Access to the Internet of Services 122
Reducing the impact of traffic sanitization on latency sensitive applications 122
Formal Modeling and Reasoning about the Android Security Framework 120
A survey on energy-aware security mechanisms 120
Trusted host-based card emulation 120
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 119
SoRTSim: A high-level simulator for the evaluation of QoS models on Grid 118
Social Network Engineering for Secure Web Data and Services 118
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 118
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices 118
A Taxonomy-based Model of Security and Privacy in Online Social Networks 117
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices 114
A distributed approach for structured resource discovery on Grid 114
Balancing Delays and Energy Consumption in IPS-Enabled Networks 114
Android Permissions Unleashed 113
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4 112
Performance assessment and analysis of DNS tunneling tools 112
Enabling BYOD through secure meta-market 111
Generating statistical insights into network behavior using SKETURE 111
On Social Network Engineering for Secure Web Data and Services 110
Security considerations related to the use of mobile devices in the operation of critical infrastructures 109
Towards energy-aware intrusion detection systems on mobile devices 109
Phishing attacks on modern android 108
The energy impact of security mechanisms in modern mobile devices 106
IPS-based reduction of network energy consumption 106
Breaking and fixing the Android Launching Flow 105
Reducing energy consumption in prospective memory support system through hierarchical positioning algorithm 105
On energy-based profiling of malware in Android 104
SoRTSim: A High-Level Simulator for the Evaluation of QoS Models on Grid 104
Covert channels in IoT deployments through data hiding techniques 103
On the Feasibility of Moderating a Peer-To-Peer CDN System: A Proof-of-Concept Implementation 102
Behavioral Anomaly Detection in Forensics Analysis 102
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches 100
RmPerm: A Tool for Android Permissions Removal 99
Modeling the energy consumption of Distributed IDS: a step towards Green Security 98
Riskindroid: Machine Learning-Based risk analysis on Android 98
Low-Resource Footprint, Data-Driven Malware Detection on Android 98
Formal Analysis of a Privacy-Preserving Billing Protocol 97
Bring your own device, securely 97
Dynamic latency sensitivity recognition: An application to energy saving 97
Optimizing Network Energy Consumption through Intrusion Prevention Systems 97
On Re-use of randomness in broadcast encryption 96
Securing the ``Bring Your Own Device'' Paradigm 96
Mobile App Security Analysis with the MAVeriC Static Analysis Module 96
On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks 96
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition 95
Mobile app security assessment with the maveric dynamic analysis module 94
Quality of Service on Grid: Architectural and methodological issues 93
HPC & Co strike back: Where are distributed paradigms heading toward? 91
BYODCert: Toward a cross-organizational BYOD paradigm 91
Attacking (and Defending) the Maritime Radar System 90
Anomaly Detection in Computer Networks: A State-of-the-Art Review 87
Securing the “bring your own device” policy 86
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem 86
Cooperative Access Control for the Grid 85
A bio-inspired approach to attack graphs analysis 85
From HPC to security: How to change research focus and survive - A career perspective 85
null 83
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 80
A cooperative model for resource sharing on grid 79
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 79
Market-based security for mobile devices 78
Using ETC framework in virtual laboratories for online students 77
Green-Aware Security: Towards a New Research Field 77
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 75
Automated Security Analysis of IoT Software Updates 75
FLEX: A flexible code authentication framework for delegating mobile app customization 73
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 72
Blockchain-based risk mitigation for invoice financing 71
Securing PIN-based authentication in smartwatches with just two gestures 69
null 68
Droids in disarray: Detecting frame confusion in hybrid android apps 68
Improving energy efficiency in distributed intrusion detection systems 65
SKETURE: A sketch-based packet analysis tool 63
What is Green Security? 63
Towards Policy-Driven Monitoring of Fog Applications 63
The Workshops of the 5thIEEE European Symposium on Security and Privacy - Preface 62
A secure cloud-edges computing architecture for metagenomics analysis 60
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks 59
Totale 12.779
Categoria #
all - tutte 41.561
article - articoli 14.965
book - libri 0
conference - conferenze 19.721
curatela - curatele 314
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 6.561
Totale 83.122


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/20202.388 0 0 0 0 206 269 375 188 287 532 391 140
2020/20213.674 95 69 152 89 51 149 647 913 764 549 97 99
2021/20221.493 25 101 161 147 79 87 128 311 80 148 70 156
2022/20231.520 139 110 27 97 206 273 17 138 310 10 148 45
2023/2024981 60 113 53 128 66 197 59 50 21 27 98 109
2024/2025733 62 215 84 176 196 0 0 0 0 0 0 0
Totale 13.862