VERDERAME, LUCA
 Distribuzione geografica
Continente #
EU - Europa 528
Totale 528
Nazione #
IT - Italia 528
Totale 528
Città #
Genova 207
Genoa 202
Rapallo 101
Bordighera 18
Totale 528
Nome #
Automated Security Analysis of IoT Software Updates, file e268c4cc-419b-a6b7-e053-3a05fe0adea1 292
You Shall not Repackage! Demystifying Anti-Repackaging on Android, file e268c4cd-c823-a6b7-e053-3a05fe0adea1 123
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection, file e268c4ce-6eae-a6b7-e053-3a05fe0adea1 33
Fine-hearing Google Home: why silence will not protect your privacy, file e268c4cc-9d12-a6b7-e053-3a05fe0adea1 8
On the (Un)Reliability of Privacy Policies in Android Apps, file e268c4cd-7a96-a6b7-e053-3a05fe0adea1 8
Deep adversarial learning on google home devices, file e268c4ce-5719-a6b7-e053-3a05fe0adea1 6
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization, file e268c4ce-6ea7-a6b7-e053-3a05fe0adea1 6
PARIOT: Anti-repackaging for IoT firmware integrity, file da6afd23-2fab-4663-94be-c5c8f462ebc2 5
Obfuscapk: An open-source black-box obfuscation tool for Android apps, file e268c4cc-3b41-a6b7-e053-3a05fe0adea1 5
SEBASTiAn: a Static and Extensible Black-box Application Security Testing tool for iOS and Android applications, file 26fe8d40-d46d-4ec9-adab-c28f26865c48 4
Automatic Security Assessment of GitHub Actions Workflows, file 47c0cb1a-aacc-4369-8996-f67eba8fee74 4
Alice in (Software Supply) Chains: Risk Identification and Evaluation, file 586814c6-276c-4b1b-8626-21c6e5f05313 4
Understanding fuchsia security, file e268c4ce-6ea8-a6b7-e053-3a05fe0adea1 4
SecCo: Automated Services to Secure Containers in the DevOps Paradigm, file cb0f7a77-af66-4ab3-8ab9-01fba45c5fdf 3
Securing PIN-based authentication in smartwatches with just two gestures, file e268c4cc-3e3b-a6b7-e053-3a05fe0adea1 2
Gotta CAPTCHA 'Em All: A Survey of 20 Years of the Human-or-computer Dilemma, file e268c4ce-3031-a6b7-e053-3a05fe0adea1 2
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows, file 7e39134d-f627-4b93-bbe7-314f3c1f8c12 1
Bring your own device, securely, file e268c4c6-1a7d-a6b7-e053-3a05fe0adea1 1
Breaking and fixing the Android Launching Flow, file e268c4c6-2e9e-a6b7-e053-3a05fe0adea1 1
Securing the ``Bring Your Own Device'' Paradigm, file e268c4c6-2ea2-a6b7-e053-3a05fe0adea1 1
Securing the “bring your own device” policy, file e268c4c6-2ea9-a6b7-e053-3a05fe0adea1 1
Market-based security for mobile devices, file e268c4c6-2eaa-a6b7-e053-3a05fe0adea1 1
Security considerations related to the use of mobile devices in the operation of critical infrastructures, file e268c4c6-2ead-a6b7-e053-3a05fe0adea1 1
Formal modeling and automatic enforcement of Bring Your Own Device policies, file e268c4c6-317a-a6b7-e053-3a05fe0adea1 1
Android vs. SEAndroid: An empirical assessment, file e268c4c6-f5cd-a6b7-e053-3a05fe0adea1 1
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices, file e268c4c6-fd1e-a6b7-e053-3a05fe0adea1 1
Automatic security verification of mobile app configurations, file e268c4c8-b4ee-a6b7-e053-3a05fe0adea1 1
A secure cloud-edges computing architecture for metagenomics analysis, file e268c4cb-8637-a6b7-e053-3a05fe0adea1 1
Towards Policy-Driven Monitoring of Fog Applications, file e268c4cb-c3ed-a6b7-e053-3a05fe0adea1 1
Droids in disarray: Detecting frame confusion in hybrid android apps, file e268c4cc-1219-a6b7-e053-3a05fe0adea1 1
Effective Security Assessment of Mobile Apps with MAVeriC: Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps. Design, Implementation, and Integration of a Unified Analysis Environment for Mobile Apps, file e268c4cc-29d4-a6b7-e053-3a05fe0adea1 1
Blockchain-based risk mitigation for invoice financing, file e268c4cc-3e37-a6b7-e053-3a05fe0adea1 1
2GesturePIN: Securing PIN-Based Authentication on Smartwatches, file e268c4cc-3e39-a6b7-e053-3a05fe0adea1 1
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices, file e268c4cc-3e3d-a6b7-e053-3a05fe0adea1 1
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing, file e268c4cc-43db-a6b7-e053-3a05fe0adea1 1
Totale 528
Categoria #
all - tutte 1.462
article - articoli 716
book - libri 0
conference - conferenze 226
curatela - curatele 0
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 520
Totale 2.924


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2019/202010 0 0 0 1 0 0 0 0 1 5 1 2
2020/202157 3 0 3 1 5 1 6 11 4 7 10 6
2021/2022134 5 6 11 24 11 13 12 1 14 8 21 8
2022/2023137 6 3 7 11 7 19 10 13 15 12 12 22
2023/2024182 10 11 10 29 11 11 31 26 18 24 1 0
Totale 528