Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Alessio Merlo
@article{DBLP:journals/compsec/RomdhanaMCT23, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Assessing the security of inter-app communications in android through reinforcement learning}, journal = {Comput. Secur.}, volume = {131}, pages = {103311}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103311}, doi = {10.1016/J.COSE.2023.103311}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/VerderameRM23, author = {Luca Verderame and Antonio Ruggia and Alessio Merlo}, title = {{PARIOT:} Anti-repackaging for IoT firmware integrity}, journal = {J. Netw. Comput. Appl.}, volume = {217}, pages = {103699}, year = {2023}, url = {https://doi.org/10.1016/j.jnca.2023.103699}, doi = {10.1016/J.JNCA.2023.103699}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/VerderameRM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/LongoOMMR23, author = {Giacomo Longo and Alessandro Orlich and Stefano Musante and Alessio Merlo and Enrico Russo}, title = {MaCySTe: {A} virtual testbed for maritime cybersecurity}, journal = {SoftwareX}, volume = {23}, pages = {101426}, year = {2023}, url = {https://doi.org/10.1016/j.softx.2023.101426}, doi = {10.1016/J.SOFTX.2023.101426}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/softx/LongoOMMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/PaganoRCVM23, author = {Francesco Pagano and Andrea Romdhana and Davide Caputo and Luca Verderame and Alessio Merlo}, title = {SEBASTiAn: {A} static and extensible black-box application security testing tool for iOS and Android applications}, journal = {SoftwareX}, volume = {23}, pages = {101448}, year = {2023}, url = {https://doi.org/10.1016/j.softx.2023.101448}, doi = {10.1016/J.SOFTX.2023.101448}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/softx/PaganoRCVM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaputoPBVM23, author = {Davide Caputo and Francesco Pagano and Giovanni Bottino and Luca Verderame and Alessio Merlo}, title = {You Can't Always Get What You Want: Towards User-Controlled Privacy on Android}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {975--987}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3146020}, doi = {10.1109/TDSC.2022.3146020}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaputoPBVM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RussoCLAM23, author = {Enrico Russo and Gabriele Costa and Giacomo Longo and Alessandro Armando and Alessio Merlo}, title = {LiDiTE: {A} Full-Fledged and Featherweight Digital Twin Framework}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4899--4912}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2023.3236798}, doi = {10.1109/TDSC.2023.3236798}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/RussoCLAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LongoRAM23, author = {Giacomo Longo and Enrico Russo and Alessandro Armando and Alessio Merlo}, title = {Attacking (and Defending) the Maritime Radar System}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3575--3589}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3282132}, doi = {10.1109/TIFS.2023.3282132}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LongoRAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LongoOMR23, author = {Giacomo Longo and Alessandro Orlich and Alessio Merlo and Enrico Russo}, title = {Enabling Real-Time Remote Monitoring of Ships by Lossless Protocol Transformations}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {7}, pages = {7285--7295}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3258365}, doi = {10.1109/TITS.2023.3258365}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/LongoOMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/RuggiaPMNA23, author = {Antonio Ruggia and Andrea Possemato and Alessio Merlo and Dario Nisi and Simone Aonzo}, title = {Android, Notify Me When It Is Time To Go Phishing}, booktitle = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023, Delft, Netherlands, July 3-7, 2023}, pages = {1--17}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSP57164.2023.00010}, doi = {10.1109/EUROSP57164.2023.00010}, timestamp = {Mon, 07 Aug 2023 15:56:23 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/RuggiaPMNA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BenedettiVM23, author = {Giacomo Benedetti and Luca Verderame and Alessio Merlo}, title = {A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023}, pages = {21--28}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/EuroSPW59978.2023.00007}, doi = {10.1109/EUROSPW59978.2023.00007}, timestamp = {Mon, 07 Aug 2023 15:56:24 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/BenedettiVM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/LongoMAR23, author = {Giacomo Longo and Alessio Merlo and Alessandro Armando and Enrico Russo}, editor = {Sharief Oteafy and Eyuphan Bulut and Florian Tschorsch and Kanchana Thilakarathna}, title = {Electronic Attacks as a Cyber False Flag against Maritime Radars Systems}, booktitle = {48th {IEEE} Conference on Local Computer Networks, {LCN} 2023, Daytona Beach, FL, USA, October 1-5, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/LCN58197.2023.10223370}, doi = {10.1109/LCN58197.2023.10223370}, timestamp = {Tue, 16 Apr 2024 16:33:54 +0200}, biburl = {https://dblp.org/rec/conf/lcn/LongoMAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/VerderameCCM23, author = {Luca Verderame and Luca Caviglione and Roberto Carbone and Alessio Merlo}, title = {SecCo: Automated Services to Secure Containers in the DevOps Paradigm}, booktitle = {Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, {RACS} 2023, Gdansk, Poland, August 6-10, 2023}, pages = {10:1--10:6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3599957.3606222}, doi = {10.1145/3599957.3606222}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/racs/VerderameCCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucami/RussoLGM23, author = {Enrico Russo and Giacomo Longo and Meriem Guerar and Alessio Merlo}, editor = {Jos{\'{e}} Bravo and Gabriel Urz{\'{a}}iz}, title = {Cloud-Native Application Security Training and Testing with Cyber Ranges}, booktitle = {Proceedings of the 15th International Conference on Ubiquitous Computing {\&} Ambient Intelligence (UCAmI 2023) - Volume 3, Riviera Maya, Mexico, 28-29 November, 2023}, series = {Lecture Notes in Networks and Systems}, volume = {841}, pages = {205--216}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48590-9\_20}, doi = {10.1007/978-3-031-48590-9\_20}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ucami/RussoLGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-15645, author = {Borja Molina{-}Coronado and Antonio Ruggia and Usue Mori and Alessio Merlo and Alexander Mendiburu and Jos{\'{e}} Miguel{-}Alonso}, title = {Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection}, journal = {CoRR}, volume = {abs/2310.15645}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.15645}, doi = {10.48550/ARXIV.2310.15645}, eprinttype = {arXiv}, eprint = {2310.15645}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-15645.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/GuerarVMPM22, author = {Meriem Guerar and Luca Verderame and Mauro Migliardi and Francesco Palmieri and Alessio Merlo}, title = {Gotta {CAPTCHA} 'Em All: {A} Survey of 20 Years of the Human-or-computer Dilemma}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {9}, pages = {192:1--192:33}, year = {2022}, url = {https://doi.org/10.1145/3477142}, doi = {10.1145/3477142}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/GuerarVMPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/RomdhanaMCT22, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Deep Reinforcement Learning for Black-box Testing of Android Apps}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {31}, number = {4}, pages = {65:1--65:29}, year = {2022}, url = {https://doi.org/10.1145/3502868}, doi = {10.1145/3502868}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/RomdhanaMCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr2/RaimondiLMAR22, author = {Marco Raimondi and Giacomo Longo and Alessio Merlo and Alessandro Armando and Enrico Russo}, title = {Training the Maritime Security Operations Centre Teams}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2022, Rhodes, Greece, July 27-29, 2022}, pages = {388--393}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSR54599.2022.9850324}, doi = {10.1109/CSR54599.2022.9850324}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csr2/RaimondiLMAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SpegniSMPSV22, author = {Francesco Spegni and Antonio Sabatelli and Alessio Merlo and Lucia Pepa and Luca Spalazzi and Luca Verderame}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Christos Kalloniatis and John Mylopoulos and Frank Pallas and J{\"{o}}rg Pohle and M. Angela Sasse and Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Jorge Maestre Vidal and Marco Antonio Sotelo Monge and Massimiliano Albanese and Basel Katt and Sandeep Pirbhulal and Ankur Shukla}, title = {A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case}, booktitle = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS 2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE 2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13785}, pages = {409--426}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25460-4\_24}, doi = {10.1007/978-3-031-25460-4\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SpegniSMPSV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/RomdhanaCMT22, author = {Andrea Romdhana and Mariano Ceccato and Alessio Merlo and Paolo Tonella}, title = {{IFRIT:} Focused Testing through Deep Reinforcement Learning}, booktitle = {15th {IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2022, Valencia, Spain, April 4-14, 2022}, pages = {24--34}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICST53961.2022.00013}, doi = {10.1109/ICST53961.2022.00013}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/RomdhanaCMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/quatic/BenedettiVM22, author = {Giacomo Benedetti and Luca Verderame and Alessio Merlo}, editor = {Antonio Vallecillo and Joost Visser and Ricardo P{\'{e}}rez{-}Castillo}, title = {Alice in (Software Supply) Chains: Risk Identification and Evaluation}, booktitle = {Quality of Information and Communications Technology - 15th International Conference, {QUATIC} 2022, Talavera de la Reina, Spain, September 12-14, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1621}, pages = {281--295}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14179-9\_19}, doi = {10.1007/978-3-031-14179-9\_19}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/quatic/BenedettiVM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scored/BenedettiVM22, author = {Giacomo Benedetti and Luca Verderame and Alessio Merlo}, editor = {Santiago Torres{-}Arias and Marcela S. Melara and Laurent Simon}, title = {Automatic Security Assessment of GitHub Actions Workflows}, booktitle = {Proceedings of the 2022 {ACM} Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, SCORED2022, Los Angeles, CA, USA, 7 November 2022}, pages = {37--45}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3560835.3564554}, doi = {10.1145/3560835.3564554}, timestamp = {Fri, 24 Nov 2023 19:40:37 +0100}, biburl = {https://dblp.org/rec/conf/scored/BenedettiVM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-06954, author = {Enrico Russo and Gabriele Costa and Giacomo Longo and Alessandro Armando and Alessio Merlo}, title = {LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework}, journal = {CoRR}, volume = {abs/2202.06954}, year = {2022}, url = {https://arxiv.org/abs/2202.06954}, eprinttype = {arXiv}, eprint = {2202.06954}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-06954.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-05623, author = {Giacomo Longo and Enrico Russo and Alessandro Armando and Alessio Merlo}, title = {Attacking (and defending) the Maritime Radar System}, journal = {CoRR}, volume = {abs/2207.05623}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.05623}, doi = {10.48550/ARXIV.2207.05623}, eprinttype = {arXiv}, eprint = {2207.05623}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-05623.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-03837, author = {Giacomo Benedetti and Luca Verderame and Alessio Merlo}, title = {Automatic Security Assessment of GitHub Actions Workflows}, journal = {CoRR}, volume = {abs/2208.03837}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.03837}, doi = {10.48550/ARXIV.2208.03837}, eprinttype = {arXiv}, eprint = {2208.03837}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-03837.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MerloRSV21, author = {Alessio Merlo and Antonio Ruggia and Luigi Sciolla and Luca Verderame}, title = {You Shall not Repackage! Demystifying Anti-Repackaging on Android}, journal = {Comput. Secur.}, volume = {103}, pages = {102181}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102181}, doi = {10.1016/J.COSE.2021.102181}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MerloRSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/RussoVAM21, author = {Enrico Russo and Luca Verderame and Alessandro Armando and Alessio Merlo}, title = {{DIOXIN:} runtime security policy enforcement of fog applications}, journal = {Int. J. Grid Util. Comput.}, volume = {12}, number = {2}, pages = {126--138}, year = {2021}, url = {https://doi.org/10.1504/IJGUC.2021.114821}, doi = {10.1504/IJGUC.2021.114821}, timestamp = {Tue, 25 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/RussoVAM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/RanieriCVMC21, author = {Andrea Ranieri and Davide Caputo and Luca Verderame and Alessio Merlo and Luca Caviglione}, title = {Deep Adversarial Learning on Google Home devices}, journal = {J. Internet Serv. Inf. Secur.}, volume = {11}, number = {4}, pages = {33--43}, year = {2021}, url = {https://doi.org/10.22667/JISIS.2021.11.30.033}, doi = {10.22667/JISIS.2021.11.30.033}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/RanieriCVMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PaganoVM21, author = {Francesco Pagano and Luca Verderame and Alessio Merlo}, title = {Understanding Fuchsia Security}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {3}, pages = {47--64}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.09.30.047}, doi = {10.22667/JOWUA.2021.09.30.047}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PaganoVM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/MerloRSV21, author = {Alessio Merlo and Antonio Ruggia and Luigi Sciolla and Luca Verderame}, title = {{ARMAND:} Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection}, journal = {Pervasive Mob. Comput.}, volume = {76}, pages = {101443}, year = {2021}, url = {https://doi.org/10.1016/j.pmcj.2021.101443}, doi = {10.1016/J.PMCJ.2021.101443}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/MerloRSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RuggiaLVCM21, author = {Antonio Ruggia and Eleonora Losiouk and Luca Verderame and Mauro Conti and Alessio Merlo}, title = {Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {970--981}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3488021}, doi = {10.1145/3485832.3488021}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RuggiaLVCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/RomdhanaCGMT21, author = {Andrea Romdhana and Mariano Ceccato and Gabriel Claudiu Georgiu and Alessio Merlo and Paolo Tonella}, title = {{COSMO:} Code Coverage Made Easier for Android}, booktitle = {14th {IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2021, Porto de Galinhas, Brazil, April 12-16, 2021}, pages = {417--423}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICST49551.2021.00053}, doi = {10.1109/ICST49551.2021.00053}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/RomdhanaCGMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/RomdhanaM21, author = {Andrea Romdhana and Alessio Merlo}, title = {Keynote: {ARES:} {A} Deep Reinforcement Learning Tool for Black-Box Testing of Android Apps}, booktitle = {19th {IEEE} International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel, Germany, March 22-26, 2021}, pages = {173}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431072}, doi = {10.1109/PERCOMWORKSHOPS51409.2021.9431072}, timestamp = {Wed, 02 Jun 2021 11:59:28 +0200}, biburl = {https://dblp.org/rec/conf/percom/RomdhanaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/CaputoRVMC21, author = {Davide Caputo and Andrea Ranieri and Luca Verderame and Alessio Merlo and Luca Caviglione}, title = {Google Home Pcap}, publisher = {{IEEE} DataPort}, year = {2021}, month = feb, howpublished = {\url{https://doi.org/10.21227/pr94-zk95}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/pr94-zk95}, doi = {10.21227/PR94-ZK95}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/CaputoRVMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-02636, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Deep Reinforcement Learning for Black-Box Testing of Android Apps}, journal = {CoRR}, volume = {abs/2101.02636}, year = {2021}, url = {https://arxiv.org/abs/2101.02636}, eprinttype = {arXiv}, eprint = {2101.02636}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-02636.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-13023, author = {Andrea Ranieri and Davide Caputo and Luca Verderame and Alessio Merlo and Luca Caviglione}, title = {Deep Adversarial Learning on Google Home devices}, journal = {CoRR}, volume = {abs/2102.13023}, year = {2021}, url = {https://arxiv.org/abs/2102.13023}, eprinttype = {arXiv}, eprint = {2102.13023}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-13023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-01748, author = {Meriem Guerar and Luca Verderame and Mauro Migliardi and Francesco Palmieri and Alessio Merlo}, title = {Gotta {CAPTCHA} 'Em All: {A} Survey of Twenty years of the Human-or-Computer Dilemma}, journal = {CoRR}, volume = {abs/2103.01748}, year = {2021}, url = {https://arxiv.org/abs/2103.01748}, eprinttype = {arXiv}, eprint = {2103.01748}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-01748.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-02483, author = {Davide Caputo and Francesco Pagano and Giovanni Bottino and Luca Verderame and Alessio Merlo}, title = {You can't always get what you want: towards user-controlled privacy on Android}, journal = {CoRR}, volume = {abs/2106.02483}, year = {2021}, url = {https://arxiv.org/abs/2106.02483}, eprinttype = {arXiv}, eprint = {2106.02483}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-02483.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-04183, author = {Francesco Pagano and Luca Verderame and Alessio Merlo}, title = {Understanding Fuchsia Security}, journal = {CoRR}, volume = {abs/2108.04183}, year = {2021}, url = {https://arxiv.org/abs/2108.04183}, eprinttype = {arXiv}, eprint = {2108.04183}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-04183.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-04337, author = {Luca Verderame and Antonio Ruggia and Alessio Merlo}, title = {{PATRIOT:} Anti-Repackaging for IoT Firmware}, journal = {CoRR}, volume = {abs/2109.04337}, year = {2021}, url = {https://arxiv.org/abs/2109.04337}, eprinttype = {arXiv}, eprint = {2109.04337}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-04337.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/GuerarMPVM20, author = {Meriem Guerar and Mauro Migliardi and Francesco Palmieri and Luca Verderame and Alessio Merlo}, title = {Securing PIN-based authentication in smartwatches with just two gestures}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {18}, year = {2020}, url = {https://doi.org/10.1002/cpe.5549}, doi = {10.1002/CPE.5549}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/GuerarMPVM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/VerderameMMCCDM20, author = {Luca Verderame and Ivan Merelli and Lucia Morganti and Elena Corni and Daniele Cesini and Daniele D'Agostino and Alessio Merlo}, title = {A secure cloud-edges computing architecture for metagenomics analysis}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {919--930}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.09.013}, doi = {10.1016/J.FUTURE.2019.09.013}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/VerderameMMCCDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CaputoVRMC20, author = {Davide Caputo and Luca Verderame and Andrea Ranieri and Alessio Merlo and Luca Caviglione}, title = {Fine-hearing Google Home: why silence will not protect your privacy}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {35--53}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.035}, doi = {10.22667/JOWUA.2020.03.31.035}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CaputoVRMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/AonzoGVM20, author = {Simone Aonzo and Gabriel Claudiu Georgiu and Luca Verderame and Alessio Merlo}, title = {Obfuscapk: An open-source black-box obfuscation tool for Android apps}, journal = {SoftwareX}, volume = {11}, pages = {100403}, year = {2020}, url = {https://doi.org/10.1016/j.softx.2020.100403}, doi = {10.1016/J.SOFTX.2020.100403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/softx/AonzoGVM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/GuerarVMPMV20, author = {Meriem Guerar and Luca Verderame and Alessio Merlo and Francesco Palmieri and Mauro Migliardi and Luca Vallerini}, title = {CirclePIN: {A} Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {4}, number = {3}, pages = {34:1--34:19}, year = {2020}, url = {https://doi.org/10.1145/3365995}, doi = {10.1145/3365995}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcps/GuerarVMPMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tem/GuerarMMPV20, author = {Meriem Guerar and Alessio Merlo and Mauro Migliardi and Francesco Palmieri and Luca Verderame}, title = {A Fraud-Resilient Blockchain-Based Solution for Invoice Financing}, journal = {{IEEE} Trans. Engineering Management}, volume = {67}, number = {4}, pages = {1086--1098}, year = {2020}, url = {https://doi.org/10.1109/TEM.2020.2971865}, doi = {10.1109/TEM.2020.2971865}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tem/GuerarMMPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/AonzoMMOP20, author = {Simone Aonzo and Alessio Merlo and Mauro Migliardi and Luca Oneto and Francesco Palmieri}, title = {Low-Resource Footprint, Data-Driven Malware Detection on Android}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {5}, number = {2}, pages = {213--222}, year = {2020}, url = {https://doi.org/10.1109/TSUSC.2017.2774184}, doi = {10.1109/TSUSC.2017.2774184}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/AonzoMMOP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/CaputoVM20, author = {Davide Caputo and Luca Verderame and Alessio Merlo}, editor = {Jianying Zhou and Mauro Conti and Chuadhry Mujeeb Ahmed and Man Ho Au and Lejla Batina and Zhou Li and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Weizhi Meng and Mart{\'{\i}}n Ochoa and Stjepan Picek and Georgios Portokalidis and Cong Wang and Kehuan Zhang}, title = {MobHide: App-Level Runtime Data Anonymization on Mobile}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12418}, pages = {490--507}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61638-0\_27}, doi = {10.1007/978-3-030-61638-0\_27}, timestamp = {Thu, 18 Feb 2021 13:46:45 +0100}, biburl = {https://dblp.org/rec/conf/acns/CaputoVM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CibinGMMV20, author = {Nicola Cibin and Meriem Guerar and Alessio Merlo and Mauro Migliardi and Luca Verderame}, editor = {Leonard Barolli and Flora Amato and Francesco Moscato and Tomoya Enokido and Makoto Takizawa}, title = {Towards a SIP-based DDoS Attack to the 4G Network}, booktitle = {Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications, {AINA} Workshops 2020, Caserta, Italy, 15-17 April}, series = {Advances in Intelligent Systems and Computing}, volume = {1150}, pages = {857--866}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44038-1\_78}, doi = {10.1007/978-3-030-44038-1\_78}, timestamp = {Thu, 04 Apr 2024 17:08:34 +0200}, biburl = {https://dblp.org/rec/conf/aina/CibinGMMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/VerderameCMM20, author = {Luca Verderame and Davide Caputo and Mauro Migliardi and Alessio Merlo}, editor = {Leonard Barolli and Flora Amato and Francesco Moscato and Tomoya Enokido and Makoto Takizawa}, title = {AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems}, booktitle = {Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications, {AINA} Workshops 2020, Caserta, Italy, 15-17 April}, series = {Advances in Intelligent Systems and Computing}, volume = {1150}, pages = {867--876}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44038-1\_79}, doi = {10.1007/978-3-030-44038-1\_79}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/VerderameCMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpscip/GazzarataTVAVCM20, author = {Giorgia Gazzarata and Ernesto Troiano and Luca Verderame and Maurizio Aiello and Ivan Vaccari and Enrico Cambiaso and Alessio Merlo}, editor = {Habtamu Abie and Silvio Ranise and Luca Verderame and Enrico Cambiaso and Rita Maria Ugarelli and Gabriele Giunta and Isabel Pra{\c{c}}a and Federica Battisti}, title = {{FINSTIX:} {A} Cyber-Physical Data Model for Financial Critical Infrastructures}, booktitle = {Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, {CPS4CIP} 2020, Guildford, UK, September 18, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12618}, pages = {48--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69781-5\_4}, doi = {10.1007/978-3-030-69781-5\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpscip/GazzarataTVAVCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/VerderameCRM20, author = {Luca Verderame and Davide Caputo and Andrea Romdhana and Alessio Merlo}, title = {On the (Un)Reliability of Privacy Policies in Android Apps}, booktitle = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020, Glasgow, United Kingdom, July 19-24, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCNN48605.2020.9206660}, doi = {10.1109/IJCNN48605.2020.9206660}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/VerderameCRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/CaputoVMRC20, author = {Davide Caputo and Luca Verderame and Alessio Merlo and Andrea Ranieri and Luca Caviglione}, editor = {Michele Loreti and Luca Spalazzi}, title = {Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers}, booktitle = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, Italy, February 4th to 7th, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2597}, pages = {105--118}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2597/paper-10.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/CaputoVMRC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MantovaniAUMB20, author = {Alessandro Mantovani and Simone Aonzo and Xabier Ugarte{-}Pedrero and Alessio Merlo and Davide Balzarotti}, title = {Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/prevalence-and-impact-of-low-entropy-packing-schemes-in-the-malware-ecosystem/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MantovaniAUMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/VerderameCRM20, author = {Luca Verderame and Davide Caputo and Andrea Romdhana and Alessio Merlo}, editor = {Valentina Casola and Alessandra De Benedictis and Massimiliano Rak}, title = {APPregator: {A} Large-Scale Platform for Mobile Security Analysis}, booktitle = {Testing Software and Systems - 32nd {IFIP} {WG} 6.1 International Conference, {ICTSS} 2020, Naples, Italy, December 9-11, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12543}, pages = {73--88}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64881-7\_5}, doi = {10.1007/978-3-030-64881-7\_5}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pts/VerderameCRM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pts/RussoVM20, author = {Enrico Russo and Luca Verderame and Alessio Merlo}, editor = {Valentina Casola and Alessandra De Benedictis and Massimiliano Rak}, title = {Enabling Next-Generation Cyber Ranges with Mobile Security Components}, booktitle = {Testing Software and Systems - 32nd {IFIP} {WG} 6.1 International Conference, {ICTSS} 2020, Naples, Italy, December 9-11, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12543}, pages = {150--165}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64881-7\_10}, doi = {10.1007/978-3-030-64881-7\_10}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pts/RussoVM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-08559, author = {Luca Verderame and Davide Caputo and Andrea Romdhana and Alessio Merlo}, title = {On the (Un)Reliability of Privacy Policies in Android Apps}, journal = {CoRR}, volume = {abs/2004.08559}, year = {2020}, url = {https://arxiv.org/abs/2004.08559}, eprinttype = {arXiv}, eprint = {2004.08559}, timestamp = {Wed, 22 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-08559.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-04718, author = {Alessio Merlo and Antonio Ruggia and Luigi Sciolla and Luca Verderame}, title = {You Shall not Repackage! {A} Journey into the World of Anti-Repackaging on Android}, journal = {CoRR}, volume = {abs/2009.04718}, year = {2020}, url = {https://arxiv.org/abs/2009.04718}, eprinttype = {arXiv}, eprint = {2009.04718}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-04718.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-09292, author = {Alessio Merlo and Antonio Ruggia and Luigi Sciolla and Luca Verderame}, title = {{ARMAND:} Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection}, journal = {CoRR}, volume = {abs/2012.09292}, year = {2020}, url = {https://arxiv.org/abs/2012.09292}, eprinttype = {arXiv}, eprint = {2012.09292}, timestamp = {Sun, 03 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-09292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BaddarMM19, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi}, title = {Behavioral-Anomaly Detection in Forensics Analysis}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {1}, pages = {55--62}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2894917}, doi = {10.1109/MSEC.2019.2894917}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/BaddarMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CaputoVAM19, author = {Davide Caputo and Luca Verderame and Simone Aonzo and Alessio Merlo}, editor = {Simon N. Foley}, title = {Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {121--139}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_7}, doi = {10.1007/978-3-030-22479-0\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CaputoVAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/GuerarVMM19, author = {Meriem Guerar and Luca Verderame and Alessio Merlo and Mauro Migliardi}, editor = {Bipin C. Desai and Dimosthenis Anagnostopoulos and Yannis Manolopoulos and Mara Nikolaidou}, title = {Blockchain-based risk mitigation for invoice financing}, booktitle = {Proceedings of the 23rd International Database Applications {\&} Engineering Symposium, {IDEAS} 2019, Athens, Greece, June 10-12, 2019}, pages = {20:1--20:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3331076.3331093}, doi = {10.1145/3331076.3331093}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ideas/GuerarVMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/RussoVM19, author = {Enrico Russo and Luca Verderame and Alessio Merlo}, editor = {Sumitra Reddy}, title = {Towards Policy-Driven Monitoring of Fog Applications}, booktitle = {28th {IEEE} International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, {WETICE} 2019, Naples, Italy, June 12-14, 2019}, pages = {93--97}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WETICE.2019.00026}, doi = {10.1109/WETICE.2019.00026}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wetice/RussoVM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/GuerarVMM19, author = {Meriem Guerar and Luca Verderame and Mauro Migliardi and Alessio Merlo}, editor = {Sumitra Reddy}, title = {2GesturePIN: Securing PIN-Based Authentication on Smartwatches}, booktitle = {28th {IEEE} International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, {WETICE} 2019, Naples, Italy, June 12-14, 2019}, pages = {327--333}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WETICE.2019.00074}, doi = {10.1109/WETICE.2019.00074}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/GuerarVMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DejonCVAM19, author = {Nicolas Dejon and Davide Caputo and Luca Verderame and Alessandro Armando and Alessio Merlo}, editor = {Maryline Laurent and Thanassis Giannetsos}, title = {Automated Security Analysis of IoT Software Updates}, booktitle = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12024}, pages = {223--239}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41702-4\_14}, doi = {10.1007/978-3-030-41702-4\_14}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/DejonCVAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaddarMMP18, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi and Francesco Palmieri}, title = {Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition}, journal = {Comput. Secur.}, volume = {76}, pages = {311--326}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.12.003}, doi = {10.1016/J.COSE.2017.12.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaddarMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuerarMMP18, author = {Meriem Guerar and Alessio Merlo and Mauro Migliardi and Francesco Palmieri}, title = {Invisible {CAPPCHA:} {A} usable mechanism to distinguish between malware and humans on the mobile IoT}, journal = {Comput. Secur.}, volume = {78}, pages = {255--266}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.007}, doi = {10.1016/J.COSE.2018.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuerarMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LimetMS18, author = {S{\'{e}}bastien Limet and Alessio Merlo and Luca Spalazzi}, title = {{HPC} {\&} Co strike back: Where are distributed paradigms heading toward?}, journal = {Concurr. Comput. Pract. Exp.}, volume = {30}, number = {9}, year = {2018}, url = {https://doi.org/10.1002/cpe.4431}, doi = {10.1002/CPE.4431}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LimetMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CostaMVA18, author = {Gabriele Costa and Alessio Merlo and Luca Verderame and Alessandro Armando}, title = {Automatic security verification of mobile app configurations}, journal = {Future Gener. Comput. Syst.}, volume = {80}, pages = {519--536}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.06.014}, doi = {10.1016/J.FUTURE.2016.06.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CostaMVA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GuerarMM18, author = {Meriem Guerar and Alessio Merlo and Mauro Migliardi}, title = {Completely Automated Public Physical test to tell Computers and Humans Apart: {A} usability study on mobile devices}, journal = {Future Gener. Comput. Syst.}, volume = {82}, pages = {617--630}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.03.012}, doi = {10.1016/J.FUTURE.2017.03.012}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/GuerarMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GuerarMMBPC18, author = {Meriem Guerar and Mauro Migliardi and Alessio Merlo and Mohamed Benmohammed and Francesco Palmieri and Aniello Castiglione}, title = {Using Screen Brightness to Improve Security in Mobile Social Network Access}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {4}, pages = {621--632}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2601603}, doi = {10.1109/TDSC.2016.2601603}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GuerarMMBPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CaviglioneMM18, author = {Luca Caviglione and Alessio Merlo and Mauro Migliardi}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Marek R. Ogiela and Lidia Ogiela and Nadeem Javaid}, title = {Covert Channels in IoT Deployments Through Data Hiding Techniques}, booktitle = {32nd International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2018 workshops, Krakow, Poland, May 16-18, 2018}, pages = {559--563}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/WAINA.2018.00144}, doi = {10.1109/WAINA.2018.00144}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CaviglioneMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AonzoMTF18, author = {Simone Aonzo and Alessio Merlo and Giulio Tavella and Yanick Fratantonio}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Phishing Attacks on Modern Android}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1788--1801}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243778}, doi = {10.1145/3243734.3243778}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AonzoMTF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ContiRMMV18, author = {Vincenzo Conti and Simone Sante Ruffo and Alessio Merlo and Mauro Migliardi and Salvatore Vitabile}, editor = {Arcangelo Castiglione and Florin Pop and Massimo Ficco and Francesco Palmieri}, title = {A Bio-inspired Approach to Attack Graphs Analysis}, booktitle = {Cyberspace Safety and Security - 10th International Symposium, {CSS} 2018, Amalfi, Italy, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11161}, pages = {63--76}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01689-0\_5}, doi = {10.1007/978-3-030-01689-0\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/ContiRMMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucami/PedriniMFM18, author = {Davide Pedrini and Mauro Migliardi and Carlo Ferrari and Alessio Merlo}, editor = {Jos{\'{e}} Bravo and Oresti Ba{\~{n}}os}, title = {On The Case of Blockchain Adoption in the Internet of Things}, booktitle = {12th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December 4-7, 2018}, series = {{MDPI} Proceedings}, volume = {2}, number = {19}, pages = {1231}, publisher = {{MDPI}}, year = {2018}, url = {https://doi.org/10.3390/proceedings2191231}, doi = {10.3390/PROCEEDINGS2191231}, timestamp = {Mon, 07 Nov 2022 21:23:28 +0100}, biburl = {https://dblp.org/rec/conf/ucami/PedriniMFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GuerarMM17, author = {Meriem Guerar and Alessio Merlo and Mauro Migliardi}, title = {ClickPattern: {A} Pattern Lock System Resilient to Smudge and Side-channel Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {2}, pages = {64--78}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.06.31.064}, doi = {10.22667/JOWUA.2017.06.31.064}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GuerarMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/MigliardiMB17, author = {Mauro Migliardi and Alessio Merlo and Sherenaz W. Al{-}Haj Baddar}, editor = {Leonard Barolli and Olivier Terzo}, title = {Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications}, booktitle = {Complex, Intelligent, and Software Intensive Systems - Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12, 2017}, series = {Advances in Intelligent Systems and Computing}, volume = {611}, pages = {1019--1026}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61566-0\_96}, doi = {10.1007/978-3-319-61566-0\_96}, timestamp = {Thu, 28 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/MigliardiMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/BaddarMMP17, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi and Francesco Palmieri}, editor = {Man Ho Allen Au and Arcangelo Castiglione and Kim{-}Kwang Raymond Choo and Francesco Palmieri and Kuan{-}Ching Li}, title = {Dynamic Latency Sensitivity Recognition: An Application to Energy Saving}, booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference, {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10232}, pages = {138--151}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57186-7\_12}, doi = {10.1007/978-3-319-57186-7\_12}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/BaddarMMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/Merlo17, author = {Alessio Merlo}, editor = {Man Ho Allen Au and Arcangelo Castiglione and Kim{-}Kwang Raymond Choo and Francesco Palmieri and Kuan{-}Ching Li}, title = {BYODCert: Toward a Cross-Organizational {BYOD} Paradigm}, booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference, {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10232}, pages = {725--735}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57186-7\_52}, doi = {10.1007/978-3-319-57186-7\_52}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/Merlo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/Merlo17, author = {Alessio Merlo}, title = {From {HPC} to Security: How to Change Research Focus and Survive - {A} Career Perspective}, booktitle = {2017 International Conference on High Performance Computing {\&} Simulation, {HPCS} 2017, Genoa, Italy, July 17-21, 2017}, pages = {911--912}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/HPCS.2017.152}, doi = {10.1109/HPCS.2017.152}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/ieeehpcs/Merlo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/MerloG17, author = {Alessio Merlo and Gabriel Claudiu Georgiu}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {RiskInDroid: Machine Learning-Based Risk Analysis on Android}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {538--552}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_36}, doi = {10.1007/978-3-319-58469-0\_36}, timestamp = {Wed, 17 May 2017 12:30:16 +0200}, biburl = {https://dblp.org/rec/conf/sec/MerloG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AonzoLM17, author = {Simone Aonzo and Giovanni Lagorio and Alessio Merlo}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {RmPerm: {A} Tool for Android Permissions Removal}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {319--326}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006420203190326}, doi = {10.5220/0006420203190326}, timestamp = {Thu, 17 Aug 2017 18:31:18 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AonzoLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igpl/MerloSM16, author = {Alessio Merlo and Elena Spadacini and Mauro Migliardi}, title = {IPS-based reduction of network energy consumption}, journal = {Log. J. {IGPL}}, volume = {24}, number = {6}, pages = {982--995}, year = {2016}, url = {https://doi.org/10.1093/jigpal/jzw053}, doi = {10.1093/JIGPAL/JZW053}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/igpl/MerloSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/BaddarMM16, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi}, title = {Generating statistical insights into network behavior using {SKETURE}}, journal = {J. High Speed Networks}, volume = {22}, number = {1}, pages = {65--76}, year = {2016}, url = {https://doi.org/10.3233/JHS-160539}, doi = {10.3233/JHS-160539}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/BaddarMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/MerloCVA16, author = {Alessio Merlo and Gabriele Costa and Luca Verderame and Alessandro Armando}, title = {Android vs. SEAndroid: An empirical assessment}, journal = {Pervasive Mob. Comput.}, volume = {30}, pages = {113--131}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2016.01.006}, doi = {10.1016/J.PMCJ.2016.01.006}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/MerloCVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/MerloMS16, author = {Alessio Merlo and Mauro Migliardi and Elena Spadacini}, editor = {Leonard Barolli and Makoto Takizawa and Tomoya Enokido and Antonio J. Jara and Yann Bocchi}, title = {Balancing Delays and Energy Consumption in IPS-Enabled Networks}, booktitle = {30th International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland, March 23-25, 2016}, pages = {267--272}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/WAINA.2016.109}, doi = {10.1109/WAINA.2016.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/MerloMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CostaGMY16, author = {Gabriele Costa and Paolo Gasti and Alessio Merlo and Shunt{-}Hsi Yu}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {{FLEX:} {A} Flexible Code Authentication Framework for Delegating Mobile App Customization}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {389--400}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897887}, doi = {10.1145/2897845.2897887}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CostaGMY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcis/Armando0MVW16, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame and Konrad S. Wrona}, title = {Developing a {NATO} {BYOD} security policy}, booktitle = {International Conference on Military Communications and Information Systems, {ICMCIS} 2016, Brussels, Belgium, May 23-24, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICMCIS.2016.7496587}, doi = {10.1109/ICMCIS.2016.7496587}, timestamp = {Mon, 22 Apr 2024 10:35:20 +0200}, biburl = {https://dblp.org/rec/conf/icmcis/Armando0MVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/MerloLV16, author = {Alessio Merlo and Luca Lorrai and Luca Verderame}, title = {Efficient trusted host-based card emulation on TEE-enabled Android devices}, booktitle = {International Conference on High Performance Computing {\&} Simulation, {HPCS} 2016, Innsbruck, Austria, July 18-22, 2016}, pages = {454--459}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/HPCSim.2016.7568370}, doi = {10.1109/HPCSIM.2016.7568370}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ieeehpcs/MerloLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArmandoCMV15, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, title = {Formal modeling and automatic enforcement of Bring Your Own Device policies}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {2}, pages = {123--140}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0252-y}, doi = {10.1007/S10207-014-0252-Y}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArmandoCMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MerloMF15, author = {Alessio Merlo and Mauro Migliardi and Paolo Fontanelli}, title = {Measuring and estimating power consumption in Android to support energy-based intrusion detection}, journal = {J. Comput. Secur.}, volume = {23}, number = {5}, pages = {611--637}, year = {2015}, url = {https://doi.org/10.3233/JCS-150530}, doi = {10.3233/JCS-150530}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MerloMF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/MerloMC15, author = {Alessio Merlo and Mauro Migliardi and Luca Caviglione}, title = {A survey on energy-aware security mechanisms}, journal = {Pervasive Mob. Comput.}, volume = {24}, pages = {77--90}, year = {2015}, url = {https://doi.org/10.1016/j.pmcj.2015.05.005}, doi = {10.1016/J.PMCJ.2015.05.005}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/MerloMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/MigliardiMP15, author = {Mauro Migliardi and Alessio Merlo and Andrea Passaglia}, editor = {Fatos Xhafa and Leonard Barolli and Fabrizio Messina and Marek R. Ogiela}, title = {On the Feasibility of Moderating a Peer-to-Peer {CDN} System: {A} Proof-of-Concept Implementation}, booktitle = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, pages = {689--694}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/3PGCIC.2015.53}, doi = {10.1109/3PGCIC.2015.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/3pgcic/MigliardiMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmandoBCMMRTV15, author = {Alessandro Armando and Gianluca Bocci and Gabriele Costa and Rocco Mammoliti and Alessio Merlo and Silvio Ranise and Riccardo Traverso and Andrea Valenza}, editor = {Elisa Bertino and Ilsun You}, title = {Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {41--49}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808786}, doi = {10.1145/2808783.2808786}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArmandoBCMMRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaddarMM15, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi}, editor = {Elisa Bertino and Ilsun You}, title = {{SKETURE:} {A} Sketch-based Packet Analysis Tool}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {67--70}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808791}, doi = {10.1145/2808783.2808791}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaddarMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArmandoCCM15, author = {Alessandro Armando and Roberto Carbone and Gabriele Costa and Alessio Merlo}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Android Permissions Unleashed}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {320--333}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.29}, doi = {10.1109/CSF.2015.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArmandoCCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/GuerarMMBM15, author = {Meriem Guerar and Mauro Migliardi and Alessio Merlo and Mohamed Benmohammed and Belhadri Messabih}, title = {A Completely Automatic Public Physical test to tell Computers and Humans Apart: {A} way to enhance authentication schemes in mobile devices}, booktitle = {2015 International Conference on High Performance Computing {\&} Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015}, pages = {203--210}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCSim.2015.7237041}, doi = {10.1109/HPCSIM.2015.7237041}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ieeehpcs/GuerarMMBM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/ArmandoMV15, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Trusted host-based card emulation}, booktitle = {2015 International Conference on High Performance Computing {\&} Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015}, pages = {221--228}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCSim.2015.7237043}, doi = {10.1109/HPCSIM.2015.7237043}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ieeehpcs/ArmandoMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoBCCMMM15, author = {Alessandro Armando and Gianluca Bocci and Giantonio Chiarelli and Gabriele Costa and Gabriele De Maglie and Rocco Mammoliti and Alessio Merlo}, editor = {Christel Baier and Cesare Tinelli}, title = {{SAM:} The Static Analysis Module of the {MAVERIC} Mobile App Security Verification Platform}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, {TACAS} 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2015, London, UK, April 11-18, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9035}, pages = {225--230}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46681-0\_19}, doi = {10.1007/978-3-662-46681-0\_19}, timestamp = {Sat, 30 Sep 2023 09:57:43 +0200}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoBCCMMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ArmandoCVM14, author = {Alessandro Armando and Gabriele Costa and Luca Verderame and Alessio Merlo}, title = {Securing the "Bring Your Own Device" Paradigm}, journal = {Computer}, volume = {47}, number = {6}, pages = {48--56}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.164}, doi = {10.1109/MC.2014.164}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ArmandoCVM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ArmandoMV14, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Security considerations related to the use of mobile devices in the operation of critical infrastructures}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {7}, number = {4}, pages = {247--256}, year = {2014}, url = {https://doi.org/10.1016/j.ijcip.2014.10.002}, doi = {10.1016/J.IJCIP.2014.10.002}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/CaviglioneCM14, author = {Luca Caviglione and Mauro Coccoli and Alessio Merlo}, title = {A taxonomy-based model of security and privacy in online social networks}, journal = {Int. J. Comput. Sci. Eng.}, volume = {9}, number = {4}, pages = {325--338}, year = {2014}, url = {https://doi.org/10.1504/IJCSE.2014.060717}, doi = {10.1504/IJCSE.2014.060717}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/CaviglioneCM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BaddarMM14, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi}, title = {Anomaly Detection in Computer Networks: {A} State-of-the-Art Review}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {29--64}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.029}, doi = {10.22667/JOWUA.2014.12.31.029}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaddarMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ArmandoCCMMM14, author = {Alessandro Armando and Giantonio Chiarelli and Gabriele Costa and Gabriele De Maglie and Rocco Mammoliti and Alessio Merlo}, title = {Mobile App Security Analysis with the MAVeriC Static Analysis Module}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {103--119}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.103}, doi = {10.22667/JOWUA.2014.12.31.103}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ArmandoCCMMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MerloMGPC14, author = {Alessio Merlo and Mauro Migliardi and Nicola Gobbo and Francesco Palmieri and Aniello Castiglione}, title = {A Denial of Service Attack to {UMTS} Networks Using SIM-Less Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {280--291}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2315198}, doi = {10.1109/TDSC.2014.2315198}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MerloMGPC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcs/MerloMF14, author = {Alessio Merlo and Mauro Migliardi and Paolo Fontanelli}, title = {On energy-based profiling of malware in Android}, booktitle = {International Conference on High Performance Computing {\&} Simulation, {HPCS} 2014, Bologna, Italy, 21-25 July, 2014}, pages = {535--542}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/HPCSim.2014.6903732}, doi = {10.1109/HPCSIM.2014.6903732}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/hpcs/MerloMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/MigliardiMC14, author = {Mauro Migliardi and Alessio Merlo and Luca Caviglione}, title = {A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing}, booktitle = {Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United Kingdom, 2-4 July, 2014}, pages = {241--246}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IMIS.2014.30}, doi = {10.1109/IMIS.2014.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/MigliardiMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/MigliardiMT14, author = {Mauro Migliardi and Alessio Merlo and Marco Tettamanti}, editor = {Fatos Xhafa and Leonard Barolli and Francesco Palmieri and Mario Koeppen and Vincenzo Loia}, title = {Reducing Energy Consumption in Prospective Memory Support System through Hierarchical Positioning Algorithm}, booktitle = {2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, September 10-12, 2014}, pages = {575--580}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INCoS.2014.47}, doi = {10.1109/INCOS.2014.47}, timestamp = {Wed, 06 Jan 2021 11:52:38 +0100}, biburl = {https://dblp.org/rec/conf/incos/MigliardiMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/softcomp/MerloMRS14, author = {Alessio Merlo and Mauro Migliardi and Diego Raso and Elena Spadacini}, editor = {Jos{\'{e}} Gaviria de la Puerta and Iv{\'{a}}n Garc{\'{\i}}a{-}Ferreira and Pablo Garc{\'{\i}}a Bringas and Fanny Klett and Ajith Abraham and Andr{\'{e}} C. P. L. F. de Carvalho and {\'{A}}lvaro Herrero and Bruno Baruque and H{\'{e}}ctor Quinti{\'{a}}n and Emilio Corchado}, title = {Optimizing Network Energy Consumption through Intrusion Prevention Systems}, booktitle = {International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao, Spain, June 25th-27th, 2014, Proceedings}, series = {Advances in Intelligent Systems and Computing}, volume = {299}, pages = {505--515}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07995-0\_50}, doi = {10.1007/978-3-319-07995-0\_50}, timestamp = {Fri, 12 Aug 2022 13:44:55 +0200}, biburl = {https://dblp.org/rec/conf/softcomp/MerloMRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/ArmandoCMV14, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Enabling {BYOD} through secure meta-market}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {219--230}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627410}, doi = {10.1145/2627393.2627410}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisec/ArmandoCMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArmandoMMV13, author = {Alessandro Armando and Alessio Merlo and Mauro Migliardi and Luca Verderame}, title = {Breaking and fixing the Android Launching Flow}, journal = {Comput. Secur.}, volume = {39}, pages = {104--115}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.009}, doi = {10.1016/J.COSE.2013.03.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArmandoMMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Merlo13, author = {Alessio Merlo}, title = {Secure cooperative access control on grid}, journal = {Future Gener. Comput. Syst.}, volume = {29}, number = {2}, pages = {497--508}, year = {2013}, url = {https://doi.org/10.1016/j.future.2012.08.001}, doi = {10.1016/J.FUTURE.2012.08.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/Merlo13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/igpl/AielloMP13, author = {Maurizio Aiello and Alessio Merlo and Gianluca Papaleo}, title = {Performance assessment and analysis of {DNS} tunneling tools}, journal = {Log. J. {IGPL}}, volume = {21}, number = {4}, pages = {592--602}, year = {2013}, url = {https://doi.org/10.1093/jigpal/jzs029}, doi = {10.1093/JIGPAL/JZS029}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/igpl/AielloMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/MigliardiM13, author = {Mauro Migliardi and Alessio Merlo}, title = {Improving energy efficiency in distributed intrusion detection systems}, journal = {J. High Speed Networks}, volume = {19}, number = {3}, pages = {251--264}, year = {2013}, url = {https://doi.org/10.3233/JHS-130476}, doi = {10.3233/JHS-130476}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/MigliardiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/GobboMM13, author = {Nicola Gobbo and Alessio Merlo and Mauro Migliardi}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {A Denial of Service Attack to {GSM} Networks via Attach Procedure}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {361--376}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_25}, doi = {10.1007/978-3-642-40588-4\_25}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/GobboMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/MigliardiM13, author = {Mauro Migliardi and Alessio Merlo}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu}, title = {Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches}, booktitle = {27th International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2013, Barcelona, Spain, March 25-28, 2013}, pages = {1547--1552}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WAINA.2013.214}, doi = {10.1109/WAINA.2013.214}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/MigliardiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/ArmandoCCFMVY13, author = {Alessandro Armando and Aniello Castiglione and Gabriele Costa and Ugo Fiore and Alessio Merlo and Luca Verderame and Ilsun You}, editor = {Khabib Mustofa and Erich J. Neuhold and A Min Tjoa and Edgar R. Weippl and Ilsun You}, title = {Trustworthy Opportunistic Access to the Internet of Services}, booktitle = {Information and Communicatiaon Technology - International Conference, ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7804}, pages = {469--478}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36818-9\_52}, doi = {10.1007/978-3-642-36818-9\_52}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/ArmandoCCFMVY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieeehpcs/CurtiMMS13, author = {Monica Curti and Alessio Merlo and Mauro Migliardi and Simone Schiappacasse}, title = {Towards energy-aware intrusion detection systems on mobile devices}, booktitle = {International Conference on High Performance Computing {\&} Simulation, {HPCS} 2013, Helsinki, Finland, July 1-5, 2013}, pages = {289--296}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/HPCSim.2013.6641428}, doi = {10.1109/HPCSIM.2013.6641428}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/ieeehpcs/CurtiMMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ArmandoCM13, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo}, editor = {Sung Y. Shin and Jos{\'{e}} Carlos Maldonado}, title = {Bring your own device, securely}, booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing, {SAC} '13, Coimbra, Portugal, March 18-22, 2013}, pages = {1852--1858}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2480362.2480707}, doi = {10.1145/2480362.2480707}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/ArmandoCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ArmandoMV13, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, editor = {Lech J. Janczewski and Henry B. Wolfe and Sujeet Shenoi}, title = {An Empirical Evaluation of the Android Security Framework}, booktitle = {Security and Privacy Protection in Information Processing Systems - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {405}, pages = {176--189}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39218-4\_14}, doi = {10.1007/978-3-642-39218-4\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ArmandoMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/CostaMV13, author = {Gabriele Costa and Alessio Merlo and Luca Verderame}, title = {Market-Based Security for Mobile Devices}, journal = {{ERCIM} News}, volume = {2013}, number = {93}, year = {2013}, url = {http://ercim-news.ercim.eu/en93/special/market-based-security-for-mobile-devices}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/CostaMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ArmandoCMV12, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo and Luca Verderame}, title = {Securing the "Bring Your Own Device" Policy}, journal = {J. Internet Serv. Inf. Secur.}, volume = {2}, number = {3/4}, pages = {3--17}, year = {2012}, url = {https://doi.org/10.22667/JISIS.2012.11.31.003}, doi = {10.22667/JISIS.2012.11.31.003}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ArmandoCMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ns/CaviglioneM12, author = {Luca Caviglione and Alessio Merlo}, title = {The energy impact of security mechanisms in modern mobile devices}, journal = {Netw. Secur.}, volume = {2012}, number = {2}, pages = {11--14}, year = {2012}, url = {https://doi.org/10.1016/S1353-4858(12)70015-6}, doi = {10.1016/S1353-4858(12)70015-6}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ns/CaviglioneM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ArmandoMMV12, author = {Alessandro Armando and Alessio Merlo and Mauro Migliardi and Luca Verderame}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Would You Mind Forking This Process? {A} Denial of Service Attack on Android (and Some Countermeasures)}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {13--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_2}, doi = {10.1007/978-3-642-30436-1\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ArmandoMMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridsec/ArmandoCM12, author = {Alessandro Armando and Roberto Carbone and Alessio Merlo}, editor = {Jorge Cu{\'{e}}llar}, title = {Formal Analysis of a Privacy-Preserving Billing Protocol}, booktitle = {Smart Grid Security - First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7823}, pages = {108--119}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38030-3\_8}, doi = {10.1007/978-3-642-38030-3\_8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/smartgridsec/ArmandoCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tap/ArmandoPCMB12, author = {Alessandro Armando and Giancarlo Pellegrino and Roberto Carbone and Alessio Merlo and Davide Balzarotti}, editor = {Achim D. Brucker and Jacques Julliand}, title = {From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap}, booktitle = {Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague, Czech Republic, May 31 - June 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7305}, pages = {3--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30473-6\_3}, doi = {10.1007/978-3-642-30473-6\_3}, timestamp = {Tue, 23 Jun 2020 17:37:39 +0200}, biburl = {https://dblp.org/rec/conf/tap/ArmandoPCMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/ArmandoCM12, author = {Alessandro Armando and Gabriele Costa and Alessio Merlo}, editor = {Catuscia Palamidessi and Mark Dermot Ryan}, title = {Formal Modeling and Reasoning about the Android Security Framework}, booktitle = {Trustworthy Global Computing - 7th International Symposium, {TGC} 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8191}, pages = {64--81}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-41157-1\_5}, doi = {10.1007/978-3-642-41157-1\_5}, timestamp = {Wed, 07 Dec 2022 23:14:04 +0100}, biburl = {https://dblp.org/rec/conf/tgc/ArmandoCM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-0687, author = {Alessandro Armando and Alessio Merlo and Luca Verderame}, title = {Security Issues in the Android Cross-Layer Architecture}, journal = {CoRR}, volume = {abs/1209.0687}, year = {2012}, url = {http://arxiv.org/abs/1209.0687}, eprinttype = {arXiv}, eprint = {1209.0687}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-0687.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/MerloCCG11, author = {Alessio Merlo and Andrea Clematis and Angelo Corana and Vittoria Gianuzzi}, title = {Quality of Service on Grid: architectural and methodological issues}, journal = {Concurr. Comput. Pract. Exp.}, volume = {23}, number = {8}, pages = {745--766}, year = {2011}, url = {https://doi.org/10.1002/cpe.1641}, doi = {10.1002/CPE.1641}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/MerloCCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/CaviglioneMM11, author = {Luca Caviglione and Alessio Merlo and Mauro Migliardi}, title = {What is Green Security?}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {366--371}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122781}, doi = {10.1109/ISIAS.2011.6122781}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/CaviglioneMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/MerloPVA11, author = {Alessio Merlo and Gianluca Papaleo and Stefano Veneziano and Maurizio Aiello}, editor = {{\'{A}}lvaro Herrero and Emilio Corchado}, title = {A Comparative Performance Evaluation of {DNS} Tunneling Tools}, booktitle = {Computational Intelligence in Security for Information Systems - 4th International Conference, {CISIS} 2011, Held at {IWANN} 2011, Torremolinos-M{\'{a}}laga, Spain, June 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6694}, pages = {84--91}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21323-6\_11}, doi = {10.1007/978-3-642-21323-6\_11}, timestamp = {Fri, 12 Aug 2022 13:44:54 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/MerloPVA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/MigliardiM11, author = {Mauro Migliardi and Alessio Merlo}, title = {Modeling the energy consumption of distributed {IDS:} {A} step towards Green security}, booktitle = {MIPRO, 2011 Proceedings of the 34th International Convention, Opatija, Croatia, 23-27 May, 2011}, pages = {1452--1457}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/5967289/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mipro/MigliardiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/GastiM11, author = {Paolo Gasti and Alessio Merlo}, title = {On Re-use of randomness in broadcast encryption}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {36--43}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971961}, doi = {10.1109/PST.2011.5971961}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/GastiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MerloA10, author = {Alessio Merlo and Alessandro Armando}, title = {Cooperative access control for the Grid}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {228--233}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604068}, doi = {10.1109/ISIAS.2010.5604068}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MerloA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/middleware/GianuzziM10, author = {Vittoria Gianuzzi and Alessio Merlo}, editor = {Lu{\'{\i}}s Veiga and Sotirios Terzis}, title = {Beaconing support in publish-subscribe middleware for vehicular applications}, booktitle = {Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing {(M-MPAC} 2010), November 29, 2010, Bangalore, India}, pages = {4}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1890791.1890795}, doi = {10.1145/1890791.1890795}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/middleware/GianuzziM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nca/GastiMCC10, author = {Paolo Gasti and Alessio Merlo and Giuseppe Ciaccio and Giovanni Chiola}, title = {On the Integrity of Network Coding-Based Anonymous {P2P} File Sharing Networks}, booktitle = {Proceedings of The Ninth {IEEE} International Symposium on Networking Computing and Applications, {NCA} 2010, July 15-17, 2010, Cambridge, Massachusetts, {USA}}, pages = {192--197}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NCA.2010.34}, doi = {10.1109/NCA.2010.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nca/GastiMCC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/GianuzziDMC09, author = {Vittoria Gianuzzi and Daniele D'Agostino and Alessio Merlo and Andrea Clematis}, title = {Efficient management of resources and entities using the HyVonNe {P2P} architecture}, journal = {Int. J. Grid Util. Comput.}, volume = {1}, number = {3}, pages = {216--226}, year = {2009}, url = {https://doi.org/10.1504/IJGUC.2009.027649}, doi = {10.1504/IJGUC.2009.027649}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/GianuzziDMC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/ClematisDQCGM08, author = {Andrea Clematis and Daniele D'Agostino and Alfonso Quarati and Angelo Corana and Vittoria Gianuzzi and Alessio Merlo}, editor = {Fatos Xhafa and Leonard Barolli}, title = {A Distributed Approach for Structured Resource Discovery on Grid}, booktitle = {Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain}, pages = {117--125}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CISIS.2008.112}, doi = {10.1109/CISIS.2008.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/ClematisDQCGM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/GianuzziMCD08, author = {Vittoria Gianuzzi and Alessio Merlo and Andrea Clematis and Daniele D'Agostino}, editor = {Fatos Xhafa and Leonard Barolli}, title = {Managing Networks of Mobiles Entities Using the HyVonNe {P2P} Architecture}, booktitle = {Second International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University of Catalonia, Barcelona, Spain}, pages = {335--341}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CISIS.2008.62}, doi = {10.1109/CISIS.2008.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisis/GianuzziMCD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/ClematisCDGM06, author = {Andrea Clematis and Angelo Corana and Daniele D'Agostino and Vittoria Gianuzzi and Alessio Merlo}, editor = {Robert Meersman and Zahir Tari}, title = {Resource Selection and Application Execution in a Grid: {A} Migration Experience from {GT2} to {GT4}}, booktitle = {On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA, and ODBASE, {OTM} Confederated International Conferences, CoopIS, DOA, GADA, and {ODBASE} 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4276}, pages = {1132--1142}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11914952\_4}, doi = {10.1007/11914952\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/ClematisCDGM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.