MERLO, ALESSIO
MERLO, ALESSIO
2GesturePIN: Securing PIN-Based Authentication on Smartwatches
2019-01-01 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A bio-inspired approach to attack graphs analysis
2018-01-01 Conti, V.; Ruffo, S. S.; Merlo, A.; Migliardi, M.; Vitabile, S.
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices
2015-01-01 Guerar, Meriem; Migliardi, Mauro; Merlo, Alessio; Benmohammed, Mohamed; Messabih, Belhadri
A distributed approach for structured resource discovery on Grid
2008-01-01 Clematis, A.; Corana, A.; D'Agostino, D.; Gianuzzi, Vittoria; Merlo, Alessio; Quarati, A.
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case
2023-01-01 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows
2023-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing
2014-01-01 Migliardi, Mauro; Merlo, Alessio; L., Caviglione
Alice in (Software Supply) Chains: Risk Identification and Evaluation
2022-01-01 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
Android Permissions Unleashed
2015-01-01 Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems
2020-01-01 Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A.
APPregator: A Large-Scale Platform for Mobile Security Analysis
2020-01-01 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers
2020-01-01 Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L.
Automatic Security Assessment of GitHub Actions Workflows
2022-01-01 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
Balancing Delays and Energy Consumption in IPS-Enabled Networks
2016-01-01 Merlo, Alessio; Migliardi, Mauro; Spadacini, Elena
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications
2010-01-01 Gianuzzi, Vittoria; Merlo, Alessio
Blockchain-based risk mitigation for invoice financing
2019-01-01 Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M.
Bring your own device, securely
2013-01-01 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Cooperative Access Control for the Grid
2010-01-01 Merlo, Alessio; Armando, Alessandro
COSMO: Code Coverage Made Easier for Android
2021-01-01 Romdhana, A.; Ceccato, M.; Georgiu, G. C.; Merlo, A.; Tonella, P.
Covert channels in IoT deployments through data hiding techniques
2018-01-01 Migliardi, M.; Merlo, A.; Caviglione, Luca
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
2GesturePIN: Securing PIN-Based Authentication on Smartwatches | 1-gen-2019 | Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A. | |
A bio-inspired approach to attack graphs analysis | 1-gen-2018 | Conti, V.; Ruffo, S. S.; Merlo, A.; Migliardi, M.; Vitabile, S. | |
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices | 1-gen-2015 | Guerar, Meriem; Migliardi, Mauro; Merlo, Alessio; Benmohammed, Mohamed; Messabih, Belhadri | |
A distributed approach for structured resource discovery on Grid | 1-gen-2008 | Clematis, A.; Corana, A.; D'Agostino, D.; Gianuzzi, Vittoria; Merlo, Alessio; Quarati, A. | |
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case | 1-gen-2023 | Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L. | |
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows | 1-gen-2023 | Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio | |
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing | 1-gen-2014 | Migliardi, Mauro; Merlo, Alessio; L., Caviglione | |
Alice in (Software Supply) Chains: Risk Identification and Evaluation | 1-gen-2022 | Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio | |
Android Permissions Unleashed | 1-gen-2015 | Armando, Alessandro; Carbone, Roberto; Costa, Gabriele; Merlo, Alessio | |
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems | 1-gen-2020 | Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A. | |
APPregator: A Large-Scale Platform for Mobile Security Analysis | 1-gen-2020 | Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A. | |
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers | 1-gen-2020 | Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L. | |
Automatic Security Assessment of GitHub Actions Workflows | 1-gen-2022 | Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio | |
Balancing Delays and Energy Consumption in IPS-Enabled Networks | 1-gen-2016 | Merlo, Alessio; Migliardi, Mauro; Spadacini, Elena | |
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications | 1-gen-2010 | Gianuzzi, Vittoria; Merlo, Alessio | |
Blockchain-based risk mitigation for invoice financing | 1-gen-2019 | Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M. | |
Bring your own device, securely | 1-gen-2013 | Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio | |
Cooperative Access Control for the Grid | 1-gen-2010 | Merlo, Alessio; Armando, Alessandro | |
COSMO: Code Coverage Made Easier for Android | 1-gen-2021 | Romdhana, A.; Ceccato, M.; Georgiu, G. C.; Merlo, A.; Tonella, P. | |
Covert channels in IoT deployments through data hiding techniques | 1-gen-2018 | Migliardi, M.; Merlo, A.; Caviglione, Luca |