MERLO, ALESSIO
MERLO, ALESSIO
2GesturePIN: Securing PIN-Based Authentication on Smartwatches
2019-01-01 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A bio-inspired approach to attack graphs analysis
2018-01-01 Conti, V.; Ruffo, S. S.; Merlo, A.; Migliardi, M.; Vitabile, S.
A Comparative Performance Evaluation of DNS Tunneling Tools
2011-01-01 Merlo, Alessio; Gianluca, Papaleo; Stefano, Veneziano; Maurizio, Aiello
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices
2015-01-01 Guerar, Meriem; Migliardi, Mauro; Merlo, Alessio; Benmohammed, Mohamed; Messabih, Belhadri
A cooperative model for resource sharing on grid
2011-01-01 Merlo, Alessio
A Denial of Service Attack to GSM Networks via Attach Procedure
2013-01-01 Nicola, Gobbo; Merlo, Alessio; Migliardi, Mauro
A denial of service attack to umts networks using sim-less devices
2014-01-01 Merlo, Alessio; Migliardi, Mauro; N., Gobbo; F., Palmieri; A., Castiglione
A distributed approach for structured resource discovery on Grid
2008-01-01 Clematis, A.; Corana, A.; D'Agostino, D.; Gianuzzi, Vittoria; Merlo, Alessio; Quarati, A.
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing
2020-01-01 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks
2013-01-01 Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
2023-01-01 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows
2023-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
A secure cloud-edges computing architecture for metagenomics analysis
2019-01-01 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing
2014-01-01 Migliardi, Mauro; Merlo, Alessio; L., Caviglione
A survey on energy-aware security mechanisms
2015-01-01 Merlo, Alessio; Migliardi, Mauro; Caviglione, Luca
A Taxonomy-based Model of Security and Privacy in Online Social Networks
2014-01-01 Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio
Alice in (Software Supply) Chains: Risk Identification and Evaluation
2022-01-01 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
An Empirical Evaluation of the Android Security Framework
2013-01-01 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications
2013-01-01 Luca, Caviglione; Merlo, Alessio
Android Permissions Unleashed
2015-01-01 Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
2GesturePIN: Securing PIN-Based Authentication on Smartwatches | 1-gen-2019 | Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A. | |
A bio-inspired approach to attack graphs analysis | 1-gen-2018 | Conti, V.; Ruffo, S. S.; Merlo, A.; Migliardi, M.; Vitabile, S. | |
A Comparative Performance Evaluation of DNS Tunneling Tools | 1-gen-2011 | Merlo, Alessio; Gianluca, Papaleo; Stefano, Veneziano; Maurizio, Aiello | |
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices | 1-gen-2015 | Guerar, Meriem; Migliardi, Mauro; Merlo, Alessio; Benmohammed, Mohamed; Messabih, Belhadri | |
A cooperative model for resource sharing on grid | 1-gen-2011 | Merlo, Alessio | |
A Denial of Service Attack to GSM Networks via Attach Procedure | 1-gen-2013 | Nicola, Gobbo; Merlo, Alessio; Migliardi, Mauro | |
A denial of service attack to umts networks using sim-less devices | 1-gen-2014 | Merlo, Alessio; Migliardi, Mauro; N., Gobbo; F., Palmieri; A., Castiglione | |
A distributed approach for structured resource discovery on Grid | 1-gen-2008 | Clematis, A.; Corana, A.; D'Agostino, D.; Gianuzzi, Vittoria; Merlo, Alessio; Quarati, A. | |
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing | 1-gen-2020 | Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca | |
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks | 1-gen-2013 | Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio | |
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case | 1-gen-2023 | Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L. | |
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows | 1-gen-2023 | Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio | |
A secure cloud-edges computing architecture for metagenomics analysis | 1-gen-2019 | Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A. | |
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing | 1-gen-2014 | Migliardi, Mauro; Merlo, Alessio; L., Caviglione | |
A survey on energy-aware security mechanisms | 1-gen-2015 | Merlo, Alessio; Migliardi, Mauro; Caviglione, Luca | |
A Taxonomy-based Model of Security and Privacy in Online Social Networks | 1-gen-2014 | Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio | |
Alice in (Software Supply) Chains: Risk Identification and Evaluation | 1-gen-2022 | Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio | |
An Empirical Evaluation of the Android Security Framework | 1-gen-2013 | Armando, Alessandro; Merlo, Alessio; Verderame, Luca | |
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications | 1-gen-2013 | Luca, Caviglione; Merlo, Alessio | |
Android Permissions Unleashed | 1-gen-2015 | Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio |