VERDERAME, LUCA

VERDERAME, LUCA  

100023 - Dipartimento di Informatica, bioingegneria, robotica e ingegneria dei sistemi  

Mostra records
Risultati 1 - 20 di 25 (tempo di esecuzione: 0.033 secondi).
Titolo Data di pubblicazione Autore(i) File
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 1-gen-2019 Guerar, M.; Verderame, L.; Migliardi, M.; Merlo, A.
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case 1-gen-2023 Spegni, F.; Sabatelli, A.; Merlo, A.; Pepa, L.; Spalazzi, L.; Verderame, L.
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows 1-gen-2023 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
Alice in (Software Supply) Chains: Risk Identification and Evaluation 1-gen-2022 Benedetti, GIACOMO RENATO; Verderame, Luca; Merlo, Alessio
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 1-gen-2020 Verderame, L.; Caputo, D.; Migliardi, M.; Merlo, A.
APPregator: A Large-Scale Platform for Mobile Security Analysis 1-gen-2020 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 1-gen-2020 Caputo, D.; Verderame, L.; Merlo, A.; Ranieri, A.; Caviglione, L.
Automatic Security Assessment of GitHub Actions Workflows 1-gen-2022 Benedetti, Giacomo; Verderame, Luca; Merlo, Alessio
Blockchain-based risk mitigation for invoice financing 1-gen-2019 Guerar, M.; Verderame, L.; Merlo, A.; Migliardi, M.
Bring your own device, securely 1-gen-2013 Armando, Alessandro; Costa, Gabriele; Verderame, Luca; Merlo, Alessio
Developing a NATO BYOD security policy 1-gen-2016 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca; Wrona, Konrad
Droids in disarray: Detecting frame confusion in hybrid android apps 1-gen-2019 Caputo, D.; Verderame, L.; Aonzo, S.; Merlo, A.
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 1-gen-2016 Merlo, Alessio; Lorrai, Luca; Verderame, Luca
Enabling BYOD through secure meta-market 1-gen-2014 Armando, Alessandro; Costa, Gabriele; Merlo, Alessio; Verderame, Luca
Enabling Next-Generation Cyber Ranges with Mobile Security Components 1-gen-2020 Russo, Enrico; Verderame, Luca; Merlo, Alessio
Enabling Next-Generation Cyber Ranges with Mobile Security Components 1-gen-2020 Russo, E.; Verderame, L.; Merlo, A.
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures 1-gen-2021 Gazzarata, G.; Troiano, E.; Verderame, L.; Aiello, M.; Vaccari, I.; Cambiaso, E.; Merlo, A.
MobHide: App-level runtime data anonymization on mobile 1-gen-2020 Caputo, D.; Verderame, L.; Merlo, A.
On the (Un)Reliability of Privacy Policies in Android Apps 1-gen-2020 Verderame, L.; Caputo, D.; Romdhana, A.; Merlo, A.
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization 1-gen-2021 Ruggia, A.; Losiouk, E.; Verderame, L.; Conti, M.; Merlo, A.