MERLO, ALESSIO
MERLO, ALESSIO
A cooperative model for resource sharing on grid
2011-01-01 Merlo, Alessio
A denial of service attack to umts networks using sim-less devices
2014-01-01 Merlo, Alessio; Migliardi, Mauro; N., Gobbo; F., Palmieri; A., Castiglione
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing
2020-01-01 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca
A secure cloud-edges computing architecture for metagenomics analysis
2019-01-01 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
A survey on energy-aware security mechanisms
2015-01-01 Merlo, Alessio; Migliardi, Mauro; Caviglione, Luca
A Taxonomy-based Model of Security and Privacy in Online Social Networks
2014-01-01 Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio
Android vs. SEAndroid: An empirical assessment
2016-01-01 Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
Anomaly Detection in Computer Networks: A State-of-the-Art Review
2014-01-01 Sherenaz Al Haj, Baddar; Merlo, Alessio; Migliardi, Mauro
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection
2021-01-01 Merlo, A.; Ruggia, A.; Sciolla, L.; Verderame, L.
Automatic security verification of mobile app configurations
2018-01-01 Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro
Behavioral Anomaly Detection in Forensics Analysis
2019-01-01 Al Haj Baddar, Sherenaz; Merlo, Alessio; Migliardi, Mauro
Breaking and fixing the Android Launching Flow
2013-01-01 Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices
2020-01-01 Guerar, Meriem; Verderame, Luca; Merlo, Alessio; Palmieri, Francesco; Migliardi, Mauro; Vallerini, Luca
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks
2017-01-01 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices
2018-01-01 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro
Deep adversarial learning on google home devices
2021-01-01 Ranieri, A.; Caputo, D.; Verderame, L.; Merlo, A.; Caviglione, L.
Deep Reinforcement Learning for Black-box Testing of Android Apps
2022-01-01 Romdhana, A.; Merlo, A.; Ceccato, M.; Tonella, P.
DIOXIN: runtime security policy enforcement of fog applications
2021-01-01 Russo, E.; Verderame, L.; Armando, A.; Merlo, A.
Dispositivi mobili: nuovi problemi di sicurezza
2013-01-01 Migliardi, Mauro; Merlo, Alessio
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture
2009-01-01 Gianuzzi, Vittoria; D'Agostino, Daniele; Merlo, Alessio; Clematis, Andrea
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
A cooperative model for resource sharing on grid | 1-gen-2011 | Merlo, Alessio | |
A denial of service attack to umts networks using sim-less devices | 1-gen-2014 | Merlo, Alessio; Migliardi, Mauro; N., Gobbo; F., Palmieri; A., Castiglione | |
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing | 1-gen-2020 | Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca | |
A secure cloud-edges computing architecture for metagenomics analysis | 1-gen-2019 | Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A. | |
A survey on energy-aware security mechanisms | 1-gen-2015 | Merlo, Alessio; Migliardi, Mauro; Caviglione, Luca | |
A Taxonomy-based Model of Security and Privacy in Online Social Networks | 1-gen-2014 | Luca, Caviglione; Coccoli, Mauro; Merlo, Alessio | |
Android vs. SEAndroid: An empirical assessment | 1-gen-2016 | Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro | |
Anomaly Detection in Computer Networks: A State-of-the-Art Review | 1-gen-2014 | Sherenaz Al Haj, Baddar; Merlo, Alessio; Migliardi, Mauro | |
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection | 1-gen-2021 | Merlo, A.; Ruggia, A.; Sciolla, L.; Verderame, L. | |
Automatic security verification of mobile app configurations | 1-gen-2018 | Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro | |
Behavioral Anomaly Detection in Forensics Analysis | 1-gen-2019 | Al Haj Baddar, Sherenaz; Merlo, Alessio; Migliardi, Mauro | |
Breaking and fixing the Android Launching Flow | 1-gen-2013 | Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca | |
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices | 1-gen-2020 | Guerar, Meriem; Verderame, Luca; Merlo, Alessio; Palmieri, Francesco; Migliardi, Mauro; Vallerini, Luca | |
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks | 1-gen-2017 | Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro | |
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices | 1-gen-2018 | Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro | |
Deep adversarial learning on google home devices | 1-gen-2021 | Ranieri, A.; Caputo, D.; Verderame, L.; Merlo, A.; Caviglione, L. | |
Deep Reinforcement Learning for Black-box Testing of Android Apps | 1-gen-2022 | Romdhana, A.; Merlo, A.; Ceccato, M.; Tonella, P. | |
DIOXIN: runtime security policy enforcement of fog applications | 1-gen-2021 | Russo, E.; Verderame, L.; Armando, A.; Merlo, A. | |
Dispositivi mobili: nuovi problemi di sicurezza | 1-gen-2013 | Migliardi, Mauro; Merlo, Alessio | |
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture | 1-gen-2009 | Gianuzzi, Vittoria; D'Agostino, Daniele; Merlo, Alessio; Clematis, Andrea |