VERDERAME, LUCA

VERDERAME, LUCA  

100023 - Dipartimento di Informatica, bioingegneria, robotica e ingegneria dei sistemi  

Mostra records
Risultati 1 - 20 di 53 (tempo di esecuzione: 0.025 secondi).
Titolo Data di pubblicazione Autore(i) File
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 1-gen-2019 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 1-gen-2020 Guerar, Meriem; Merlo, Alessio; Migliardi, Mauro; Palmieri, Francesco; Verderame, Luca
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case 1-gen-2023 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows 1-gen-2023 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
A secure cloud-edges computing architecture for metagenomics analysis 1-gen-2019 Verderame, L.; Merelli, I.; Morganti, L.; Corni, E.; Cesini, D.; D'Agostino, D.; Merlo, A.
Alice in (Software Supply) Chains: Risk Identification and Evaluation 1-gen-2022 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
An Empirical Evaluation of the Android Security Framework 1-gen-2013 Armando, Alessandro; Merlo, Alessio; Verderame, Luca
Android vs. SEAndroid: An empirical assessment 1-gen-2016 Merlo, Alessio; Costa, Gabriele; Verderame, Luca; Armando, Alessandro
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 1-gen-2020 Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A.
APPregator: A Large-Scale Platform for Mobile Security Analysis 1-gen-2020 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 1-gen-2020 Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L.
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection 1-gen-2021 Merlo, A.; Ruggia, A.; Sciolla, L.; Verderame, L.
Automated Security Analysis of IoT Software Updates 1-gen-2019 Dejon, N.; Caputo, D.; Verderame, L.; Armando, A.; Merlo, A.
Automatic Security Assessment of GitHub Actions Workflows 1-gen-2022 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
Automatic security verification of mobile app configurations 1-gen-2018 Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Armando, Alessandro
Blockchain-based risk mitigation for invoice financing 1-gen-2019 Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M.
Breaking and fixing the Android Launching Flow 1-gen-2013 Armando, Alessandro; Merlo, Alessio; Migliardi, Mauro; Verderame, Luca
Bring your own device, securely 1-gen-2013 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 1-gen-2020 Guerar, Meriem; Verderame, Luca; Merlo, Alessio; Palmieri, Francesco; Migliardi, Mauro; Vallerini, Luca
Deep adversarial learning on google home devices 1-gen-2021 Ranieri, A.; Caputo, D.; Verderame, L.; Merlo, A.; Caviglione, L.