BibTeX records: Alessio Merlo

download as .bib file

@article{DBLP:journals/compsec/RomdhanaMCT23,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Assessing the security of inter-app communications in android through
                  reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103311},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103311},
  doi          = {10.1016/J.COSE.2023.103311},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/VerderameRM23,
  author       = {Luca Verderame and
                  Antonio Ruggia and
                  Alessio Merlo},
  title        = {{PARIOT:} Anti-repackaging for IoT firmware integrity},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {217},
  pages        = {103699},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2023.103699},
  doi          = {10.1016/J.JNCA.2023.103699},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/VerderameRM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/LongoOMMR23,
  author       = {Giacomo Longo and
                  Alessandro Orlich and
                  Stefano Musante and
                  Alessio Merlo and
                  Enrico Russo},
  title        = {MaCySTe: {A} virtual testbed for maritime cybersecurity},
  journal      = {SoftwareX},
  volume       = {23},
  pages        = {101426},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.softx.2023.101426},
  doi          = {10.1016/J.SOFTX.2023.101426},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/softx/LongoOMMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/PaganoRCVM23,
  author       = {Francesco Pagano and
                  Andrea Romdhana and
                  Davide Caputo and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {SEBASTiAn: {A} static and extensible black-box application security
                  testing tool for iOS and Android applications},
  journal      = {SoftwareX},
  volume       = {23},
  pages        = {101448},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.softx.2023.101448},
  doi          = {10.1016/J.SOFTX.2023.101448},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/softx/PaganoRCVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaputoPBVM23,
  author       = {Davide Caputo and
                  Francesco Pagano and
                  Giovanni Bottino and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {You Can't Always Get What You Want: Towards User-Controlled Privacy
                  on Android},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {975--987},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3146020},
  doi          = {10.1109/TDSC.2022.3146020},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaputoPBVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RussoCLAM23,
  author       = {Enrico Russo and
                  Gabriele Costa and
                  Giacomo Longo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {LiDiTE: {A} Full-Fledged and Featherweight Digital Twin Framework},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4899--4912},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3236798},
  doi          = {10.1109/TDSC.2023.3236798},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/RussoCLAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LongoRAM23,
  author       = {Giacomo Longo and
                  Enrico Russo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {Attacking (and Defending) the Maritime Radar System},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3575--3589},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3282132},
  doi          = {10.1109/TIFS.2023.3282132},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LongoRAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LongoOMR23,
  author       = {Giacomo Longo and
                  Alessandro Orlich and
                  Alessio Merlo and
                  Enrico Russo},
  title        = {Enabling Real-Time Remote Monitoring of Ships by Lossless Protocol
                  Transformations},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {7},
  pages        = {7285--7295},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3258365},
  doi          = {10.1109/TITS.2023.3258365},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/LongoOMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/RuggiaPMNA23,
  author       = {Antonio Ruggia and
                  Andrea Possemato and
                  Alessio Merlo and
                  Dario Nisi and
                  Simone Aonzo},
  title        = {Android, Notify Me When It Is Time To Go Phishing},
  booktitle    = {8th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023, Delft, Netherlands, July 3-7, 2023},
  pages        = {1--17},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSP57164.2023.00010},
  doi          = {10.1109/EUROSP57164.2023.00010},
  timestamp    = {Mon, 07 Aug 2023 15:56:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/RuggiaPMNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BenedettiVM23,
  author       = {Giacomo Benedetti and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {A Preliminary Study of Privilege Life Cycle in Software Management
                  Platform Automation Workflows},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2023 - Workshops, Delft, Netherlands, July 3-7, 2023},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/EuroSPW59978.2023.00007},
  doi          = {10.1109/EUROSPW59978.2023.00007},
  timestamp    = {Mon, 07 Aug 2023 15:56:24 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/BenedettiVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/LongoMAR23,
  author       = {Giacomo Longo and
                  Alessio Merlo and
                  Alessandro Armando and
                  Enrico Russo},
  editor       = {Sharief Oteafy and
                  Eyuphan Bulut and
                  Florian Tschorsch and
                  Kanchana Thilakarathna},
  title        = {Electronic Attacks as a Cyber False Flag against Maritime Radars Systems},
  booktitle    = {48th {IEEE} Conference on Local Computer Networks, {LCN} 2023, Daytona
                  Beach, FL, USA, October 1-5, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/LCN58197.2023.10223370},
  doi          = {10.1109/LCN58197.2023.10223370},
  timestamp    = {Tue, 16 Apr 2024 16:33:54 +0200},
  biburl       = {https://dblp.org/rec/conf/lcn/LongoMAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/racs/VerderameCCM23,
  author       = {Luca Verderame and
                  Luca Caviglione and
                  Roberto Carbone and
                  Alessio Merlo},
  title        = {SecCo: Automated Services to Secure Containers in the DevOps Paradigm},
  booktitle    = {Proceedings of the 2023 International Conference on Research in Adaptive
                  and Convergent Systems, {RACS} 2023, Gdansk, Poland, August 6-10,
                  2023},
  pages        = {10:1--10:6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3599957.3606222},
  doi          = {10.1145/3599957.3606222},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/racs/VerderameCCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucami/RussoLGM23,
  author       = {Enrico Russo and
                  Giacomo Longo and
                  Meriem Guerar and
                  Alessio Merlo},
  editor       = {Jos{\'{e}} Bravo and
                  Gabriel Urz{\'{a}}iz},
  title        = {Cloud-Native Application Security Training and Testing with Cyber
                  Ranges},
  booktitle    = {Proceedings of the 15th International Conference on Ubiquitous Computing
                  {\&} Ambient Intelligence (UCAmI 2023) - Volume 3, Riviera Maya,
                  Mexico, 28-29 November, 2023},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {841},
  pages        = {205--216},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48590-9\_20},
  doi          = {10.1007/978-3-031-48590-9\_20},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ucami/RussoLGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-15645,
  author       = {Borja Molina{-}Coronado and
                  Antonio Ruggia and
                  Usue Mori and
                  Alessio Merlo and
                  Alexander Mendiburu and
                  Jos{\'{e}} Miguel{-}Alonso},
  title        = {Light up that Droid! On the Effectiveness of Static Analysis Features
                  against App Obfuscation for Android Malware Detection},
  journal      = {CoRR},
  volume       = {abs/2310.15645},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.15645},
  doi          = {10.48550/ARXIV.2310.15645},
  eprinttype    = {arXiv},
  eprint       = {2310.15645},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-15645.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/GuerarVMPM22,
  author       = {Meriem Guerar and
                  Luca Verderame and
                  Mauro Migliardi and
                  Francesco Palmieri and
                  Alessio Merlo},
  title        = {Gotta {CAPTCHA} 'Em All: {A} Survey of 20 Years of the Human-or-computer
                  Dilemma},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {9},
  pages        = {192:1--192:33},
  year         = {2022},
  url          = {https://doi.org/10.1145/3477142},
  doi          = {10.1145/3477142},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/GuerarVMPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/RomdhanaMCT22,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Deep Reinforcement Learning for Black-box Testing of Android Apps},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {31},
  number       = {4},
  pages        = {65:1--65:29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3502868},
  doi          = {10.1145/3502868},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/RomdhanaMCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/RaimondiLMAR22,
  author       = {Marco Raimondi and
                  Giacomo Longo and
                  Alessio Merlo and
                  Alessandro Armando and
                  Enrico Russo},
  title        = {Training the Maritime Security Operations Centre Teams},
  booktitle    = {{IEEE} International Conference on Cyber Security and Resilience,
                  {CSR} 2022, Rhodes, Greece, July 27-29, 2022},
  pages        = {388--393},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSR54599.2022.9850324},
  doi          = {10.1109/CSR54599.2022.9850324},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csr2/RaimondiLMAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SpegniSMPSV22,
  author       = {Francesco Spegni and
                  Antonio Sabatelli and
                  Alessio Merlo and
                  Lucia Pepa and
                  Luca Spalazzi and
                  Luca Verderame},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Frank Pallas and
                  J{\"{o}}rg Pohle and
                  M. Angela Sasse and
                  Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Jorge Maestre Vidal and
                  Marco Antonio Sotelo Monge and
                  Massimiliano Albanese and
                  Basel Katt and
                  Sandeep Pirbhulal and
                  Ankur Shukla},
  title        = {A Precision Cybersecurity Workflow for Cyber-physical Systems: The
                  IoT Healthcare Use Case},
  booktitle    = {Computer Security. {ESORICS} 2022 International Workshops - CyberICPS
                  2022, {SECPRE} 2022, {SPOSE} 2022, {CPS4CIP} 2022, CDT{\&}SECOMANE
                  2022, {EIS} 2022, and SecAssure 2022, Copenhagen, Denmark, September
                  26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13785},
  pages        = {409--426},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25460-4\_24},
  doi          = {10.1007/978-3-031-25460-4\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SpegniSMPSV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/RomdhanaCMT22,
  author       = {Andrea Romdhana and
                  Mariano Ceccato and
                  Alessio Merlo and
                  Paolo Tonella},
  title        = {{IFRIT:} Focused Testing through Deep Reinforcement Learning},
  booktitle    = {15th {IEEE} Conference on Software Testing, Verification and Validation,
                  {ICST} 2022, Valencia, Spain, April 4-14, 2022},
  pages        = {24--34},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICST53961.2022.00013},
  doi          = {10.1109/ICST53961.2022.00013},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/RomdhanaCMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/quatic/BenedettiVM22,
  author       = {Giacomo Benedetti and
                  Luca Verderame and
                  Alessio Merlo},
  editor       = {Antonio Vallecillo and
                  Joost Visser and
                  Ricardo P{\'{e}}rez{-}Castillo},
  title        = {Alice in (Software Supply) Chains: Risk Identification and Evaluation},
  booktitle    = {Quality of Information and Communications Technology - 15th International
                  Conference, {QUATIC} 2022, Talavera de la Reina, Spain, September
                  12-14, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1621},
  pages        = {281--295},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14179-9\_19},
  doi          = {10.1007/978-3-031-14179-9\_19},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/quatic/BenedettiVM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scored/BenedettiVM22,
  author       = {Giacomo Benedetti and
                  Luca Verderame and
                  Alessio Merlo},
  editor       = {Santiago Torres{-}Arias and
                  Marcela S. Melara and
                  Laurent Simon},
  title        = {Automatic Security Assessment of GitHub Actions Workflows},
  booktitle    = {Proceedings of the 2022 {ACM} Workshop on Software Supply Chain Offensive
                  Research and Ecosystem Defenses, SCORED2022, Los Angeles, CA, USA,
                  7 November 2022},
  pages        = {37--45},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3560835.3564554},
  doi          = {10.1145/3560835.3564554},
  timestamp    = {Fri, 24 Nov 2023 19:40:37 +0100},
  biburl       = {https://dblp.org/rec/conf/scored/BenedettiVM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-06954,
  author       = {Enrico Russo and
                  Gabriele Costa and
                  Giacomo Longo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework},
  journal      = {CoRR},
  volume       = {abs/2202.06954},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.06954},
  eprinttype    = {arXiv},
  eprint       = {2202.06954},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-06954.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-05623,
  author       = {Giacomo Longo and
                  Enrico Russo and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {Attacking (and defending) the Maritime Radar System},
  journal      = {CoRR},
  volume       = {abs/2207.05623},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.05623},
  doi          = {10.48550/ARXIV.2207.05623},
  eprinttype    = {arXiv},
  eprint       = {2207.05623},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-05623.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-03837,
  author       = {Giacomo Benedetti and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Automatic Security Assessment of GitHub Actions Workflows},
  journal      = {CoRR},
  volume       = {abs/2208.03837},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.03837},
  doi          = {10.48550/ARXIV.2208.03837},
  eprinttype    = {arXiv},
  eprint       = {2208.03837},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-03837.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MerloRSV21,
  author       = {Alessio Merlo and
                  Antonio Ruggia and
                  Luigi Sciolla and
                  Luca Verderame},
  title        = {You Shall not Repackage! Demystifying Anti-Repackaging on Android},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102181},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102181},
  doi          = {10.1016/J.COSE.2021.102181},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MerloRSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/RussoVAM21,
  author       = {Enrico Russo and
                  Luca Verderame and
                  Alessandro Armando and
                  Alessio Merlo},
  title        = {{DIOXIN:} runtime security policy enforcement of fog applications},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {126--138},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJGUC.2021.114821},
  doi          = {10.1504/IJGUC.2021.114821},
  timestamp    = {Tue, 25 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/RussoVAM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/RanieriCVMC21,
  author       = {Andrea Ranieri and
                  Davide Caputo and
                  Luca Verderame and
                  Alessio Merlo and
                  Luca Caviglione},
  title        = {Deep Adversarial Learning on Google Home devices},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {33--43},
  year         = {2021},
  url          = {https://doi.org/10.22667/JISIS.2021.11.30.033},
  doi          = {10.22667/JISIS.2021.11.30.033},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/RanieriCVMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PaganoVM21,
  author       = {Francesco Pagano and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Understanding Fuchsia Security},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {3},
  pages        = {47--64},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.09.30.047},
  doi          = {10.22667/JOWUA.2021.09.30.047},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PaganoVM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MerloRSV21,
  author       = {Alessio Merlo and
                  Antonio Ruggia and
                  Luigi Sciolla and
                  Luca Verderame},
  title        = {{ARMAND:} Anti-Repackaging through Multi-pattern Anti-tampering based
                  on Native Detection},
  journal      = {Pervasive Mob. Comput.},
  volume       = {76},
  pages        = {101443},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.pmcj.2021.101443},
  doi          = {10.1016/J.PMCJ.2021.101443},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/MerloRSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RuggiaLVCM21,
  author       = {Antonio Ruggia and
                  Eleonora Losiouk and
                  Luca Verderame and
                  Mauro Conti and
                  Alessio Merlo},
  title        = {Repack Me If You Can: An Anti-Repackaging Solution Based on Android
                  Virtualization},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {970--981},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3488021},
  doi          = {10.1145/3485832.3488021},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RuggiaLVCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/RomdhanaCGMT21,
  author       = {Andrea Romdhana and
                  Mariano Ceccato and
                  Gabriel Claudiu Georgiu and
                  Alessio Merlo and
                  Paolo Tonella},
  title        = {{COSMO:} Code Coverage Made Easier for Android},
  booktitle    = {14th {IEEE} Conference on Software Testing, Verification and Validation,
                  {ICST} 2021, Porto de Galinhas, Brazil, April 12-16, 2021},
  pages        = {417--423},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICST49551.2021.00053},
  doi          = {10.1109/ICST49551.2021.00053},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icst/RomdhanaCGMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/RomdhanaM21,
  author       = {Andrea Romdhana and
                  Alessio Merlo},
  title        = {Keynote: {ARES:} {A} Deep Reinforcement Learning Tool for Black-Box
                  Testing of Android Apps},
  booktitle    = {19th {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops and other Affiliated Events, PerCom Workshops 2021, Kassel,
                  Germany, March 22-26, 2021},
  pages        = {173},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/PerComWorkshops51409.2021.9431072},
  doi          = {10.1109/PERCOMWORKSHOPS51409.2021.9431072},
  timestamp    = {Wed, 02 Jun 2021 11:59:28 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/RomdhanaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/CaputoRVMC21,
  author       = {Davide Caputo and
                  Andrea Ranieri and
                  Luca Verderame and
                  Alessio Merlo and
                  Luca Caviglione},
  title        = {Google Home Pcap},
  publisher    = {{IEEE} DataPort},
  year         = {2021},
  month        = feb,
  howpublished = {\url{https://doi.org/10.21227/pr94-zk95}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/pr94-zk95},
  doi          = {10.21227/PR94-ZK95},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/CaputoRVMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-02636,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Deep Reinforcement Learning for Black-Box Testing of Android Apps},
  journal      = {CoRR},
  volume       = {abs/2101.02636},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.02636},
  eprinttype    = {arXiv},
  eprint       = {2101.02636},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-02636.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-13023,
  author       = {Andrea Ranieri and
                  Davide Caputo and
                  Luca Verderame and
                  Alessio Merlo and
                  Luca Caviglione},
  title        = {Deep Adversarial Learning on Google Home devices},
  journal      = {CoRR},
  volume       = {abs/2102.13023},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.13023},
  eprinttype    = {arXiv},
  eprint       = {2102.13023},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-13023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-01748,
  author       = {Meriem Guerar and
                  Luca Verderame and
                  Mauro Migliardi and
                  Francesco Palmieri and
                  Alessio Merlo},
  title        = {Gotta {CAPTCHA} 'Em All: {A} Survey of Twenty years of the Human-or-Computer
                  Dilemma},
  journal      = {CoRR},
  volume       = {abs/2103.01748},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.01748},
  eprinttype    = {arXiv},
  eprint       = {2103.01748},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-01748.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-02483,
  author       = {Davide Caputo and
                  Francesco Pagano and
                  Giovanni Bottino and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {You can't always get what you want: towards user-controlled privacy
                  on Android},
  journal      = {CoRR},
  volume       = {abs/2106.02483},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.02483},
  eprinttype    = {arXiv},
  eprint       = {2106.02483},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-02483.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-04183,
  author       = {Francesco Pagano and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Understanding Fuchsia Security},
  journal      = {CoRR},
  volume       = {abs/2108.04183},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.04183},
  eprinttype    = {arXiv},
  eprint       = {2108.04183},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-04183.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-04337,
  author       = {Luca Verderame and
                  Antonio Ruggia and
                  Alessio Merlo},
  title        = {{PATRIOT:} Anti-Repackaging for IoT Firmware},
  journal      = {CoRR},
  volume       = {abs/2109.04337},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.04337},
  eprinttype    = {arXiv},
  eprint       = {2109.04337},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-04337.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/GuerarMPVM20,
  author       = {Meriem Guerar and
                  Mauro Migliardi and
                  Francesco Palmieri and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Securing PIN-based authentication in smartwatches with just two gestures},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {18},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5549},
  doi          = {10.1002/CPE.5549},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/GuerarMPVM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/VerderameMMCCDM20,
  author       = {Luca Verderame and
                  Ivan Merelli and
                  Lucia Morganti and
                  Elena Corni and
                  Daniele Cesini and
                  Daniele D'Agostino and
                  Alessio Merlo},
  title        = {A secure cloud-edges computing architecture for metagenomics analysis},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {111},
  pages        = {919--930},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.09.013},
  doi          = {10.1016/J.FUTURE.2019.09.013},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/VerderameMMCCDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CaputoVRMC20,
  author       = {Davide Caputo and
                  Luca Verderame and
                  Andrea Ranieri and
                  Alessio Merlo and
                  Luca Caviglione},
  title        = {Fine-hearing Google Home: why silence will not protect your privacy},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {35--53},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.035},
  doi          = {10.22667/JOWUA.2020.03.31.035},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CaputoVRMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/softx/AonzoGVM20,
  author       = {Simone Aonzo and
                  Gabriel Claudiu Georgiu and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Obfuscapk: An open-source black-box obfuscation tool for Android apps},
  journal      = {SoftwareX},
  volume       = {11},
  pages        = {100403},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.softx.2020.100403},
  doi          = {10.1016/J.SOFTX.2020.100403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/softx/AonzoGVM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/GuerarVMPMV20,
  author       = {Meriem Guerar and
                  Luca Verderame and
                  Alessio Merlo and
                  Francesco Palmieri and
                  Mauro Migliardi and
                  Luca Vallerini},
  title        = {CirclePIN: {A} Novel Authentication Mechanism for Smartwatches to
                  Prevent Unauthorized Access to IoT Devices},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {4},
  number       = {3},
  pages        = {34:1--34:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3365995},
  doi          = {10.1145/3365995},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcps/GuerarVMPMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tem/GuerarMMPV20,
  author       = {Meriem Guerar and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Francesco Palmieri and
                  Luca Verderame},
  title        = {A Fraud-Resilient Blockchain-Based Solution for Invoice Financing},
  journal      = {{IEEE} Trans. Engineering Management},
  volume       = {67},
  number       = {4},
  pages        = {1086--1098},
  year         = {2020},
  url          = {https://doi.org/10.1109/TEM.2020.2971865},
  doi          = {10.1109/TEM.2020.2971865},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tem/GuerarMMPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/AonzoMMOP20,
  author       = {Simone Aonzo and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Luca Oneto and
                  Francesco Palmieri},
  title        = {Low-Resource Footprint, Data-Driven Malware Detection on Android},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {213--222},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSUSC.2017.2774184},
  doi          = {10.1109/TSUSC.2017.2774184},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/AonzoMMOP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CaputoVM20,
  author       = {Davide Caputo and
                  Luca Verderame and
                  Alessio Merlo},
  editor       = {Jianying Zhou and
                  Mauro Conti and
                  Chuadhry Mujeeb Ahmed and
                  Man Ho Au and
                  Lejla Batina and
                  Zhou Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Bo Luo and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Mart{\'{\i}}n Ochoa and
                  Stjepan Picek and
                  Georgios Portokalidis and
                  Cong Wang and
                  Kehuan Zhang},
  title        = {MobHide: App-Level Runtime Data Anonymization on Mobile},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2020
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S{\&}P, SCI,
                  SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12418},
  pages        = {490--507},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61638-0\_27},
  doi          = {10.1007/978-3-030-61638-0\_27},
  timestamp    = {Thu, 18 Feb 2021 13:46:45 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/CaputoVM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CibinGMMV20,
  author       = {Nicola Cibin and
                  Meriem Guerar and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Luca Verderame},
  editor       = {Leonard Barolli and
                  Flora Amato and
                  Francesco Moscato and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {Towards a SIP-based DDoS Attack to the 4G Network},
  booktitle    = {Web, Artificial Intelligence and Network Applications - Proceedings
                  of the Workshops of the 34th International Conference on Advanced
                  Information Networking and Applications, {AINA} Workshops 2020, Caserta,
                  Italy, 15-17 April},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1150},
  pages        = {857--866},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44038-1\_78},
  doi          = {10.1007/978-3-030-44038-1\_78},
  timestamp    = {Thu, 04 Apr 2024 17:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/CibinGMMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/VerderameCMM20,
  author       = {Luca Verderame and
                  Davide Caputo and
                  Mauro Migliardi and
                  Alessio Merlo},
  editor       = {Leonard Barolli and
                  Flora Amato and
                  Francesco Moscato and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT
                  Ecosystems},
  booktitle    = {Web, Artificial Intelligence and Network Applications - Proceedings
                  of the Workshops of the 34th International Conference on Advanced
                  Information Networking and Applications, {AINA} Workshops 2020, Caserta,
                  Italy, 15-17 April},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1150},
  pages        = {867--876},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44038-1\_79},
  doi          = {10.1007/978-3-030-44038-1\_79},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/VerderameCMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpscip/GazzarataTVAVCM20,
  author       = {Giorgia Gazzarata and
                  Ernesto Troiano and
                  Luca Verderame and
                  Maurizio Aiello and
                  Ivan Vaccari and
                  Enrico Cambiaso and
                  Alessio Merlo},
  editor       = {Habtamu Abie and
                  Silvio Ranise and
                  Luca Verderame and
                  Enrico Cambiaso and
                  Rita Maria Ugarelli and
                  Gabriele Giunta and
                  Isabel Pra{\c{c}}a and
                  Federica Battisti},
  title        = {{FINSTIX:} {A} Cyber-Physical Data Model for Financial Critical Infrastructures},
  booktitle    = {Cyber-Physical Security for Critical Infrastructures Protection -
                  First International Workshop, {CPS4CIP} 2020, Guildford, UK, September
                  18, 2020, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12618},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69781-5\_4},
  doi          = {10.1007/978-3-030-69781-5\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpscip/GazzarataTVAVCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/VerderameCRM20,
  author       = {Luca Verderame and
                  Davide Caputo and
                  Andrea Romdhana and
                  Alessio Merlo},
  title        = {On the (Un)Reliability of Privacy Policies in Android Apps},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9206660},
  doi          = {10.1109/IJCNN48605.2020.9206660},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/VerderameCRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itasec/CaputoVMRC20,
  author       = {Davide Caputo and
                  Luca Verderame and
                  Alessio Merlo and
                  Andrea Ranieri and
                  Luca Caviglione},
  editor       = {Michele Loreti and
                  Luca Spalazzi},
  title        = {Are you (Google) Home? Detecting Users' Presence through Traffic Analysis
                  of Smart Speakers},
  booktitle    = {Proceedings of the Fourth Italian Conference on Cyber Security, Ancona,
                  Italy, February 4th to 7th, 2020},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2597},
  pages        = {105--118},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2597/paper-10.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:11 +0100},
  biburl       = {https://dblp.org/rec/conf/itasec/CaputoVMRC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MantovaniAUMB20,
  author       = {Alessandro Mantovani and
                  Simone Aonzo and
                  Xabier Ugarte{-}Pedrero and
                  Alessio Merlo and
                  Davide Balzarotti},
  title        = {Prevalence and Impact of Low-Entropy Packing Schemes in the Malware
                  Ecosystem},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/prevalence-and-impact-of-low-entropy-packing-schemes-in-the-malware-ecosystem/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MantovaniAUMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/VerderameCRM20,
  author       = {Luca Verderame and
                  Davide Caputo and
                  Andrea Romdhana and
                  Alessio Merlo},
  editor       = {Valentina Casola and
                  Alessandra De Benedictis and
                  Massimiliano Rak},
  title        = {APPregator: {A} Large-Scale Platform for Mobile Security Analysis},
  booktitle    = {Testing Software and Systems - 32nd {IFIP} {WG} 6.1 International
                  Conference, {ICTSS} 2020, Naples, Italy, December 9-11, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12543},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64881-7\_5},
  doi          = {10.1007/978-3-030-64881-7\_5},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pts/VerderameCRM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pts/RussoVM20,
  author       = {Enrico Russo and
                  Luca Verderame and
                  Alessio Merlo},
  editor       = {Valentina Casola and
                  Alessandra De Benedictis and
                  Massimiliano Rak},
  title        = {Enabling Next-Generation Cyber Ranges with Mobile Security Components},
  booktitle    = {Testing Software and Systems - 32nd {IFIP} {WG} 6.1 International
                  Conference, {ICTSS} 2020, Naples, Italy, December 9-11, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12543},
  pages        = {150--165},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64881-7\_10},
  doi          = {10.1007/978-3-030-64881-7\_10},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pts/RussoVM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-08559,
  author       = {Luca Verderame and
                  Davide Caputo and
                  Andrea Romdhana and
                  Alessio Merlo},
  title        = {On the (Un)Reliability of Privacy Policies in Android Apps},
  journal      = {CoRR},
  volume       = {abs/2004.08559},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.08559},
  eprinttype    = {arXiv},
  eprint       = {2004.08559},
  timestamp    = {Wed, 22 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-08559.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-04718,
  author       = {Alessio Merlo and
                  Antonio Ruggia and
                  Luigi Sciolla and
                  Luca Verderame},
  title        = {You Shall not Repackage! {A} Journey into the World of Anti-Repackaging
                  on Android},
  journal      = {CoRR},
  volume       = {abs/2009.04718},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.04718},
  eprinttype    = {arXiv},
  eprint       = {2009.04718},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-04718.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-09292,
  author       = {Alessio Merlo and
                  Antonio Ruggia and
                  Luigi Sciolla and
                  Luca Verderame},
  title        = {{ARMAND:} Anti-Repackaging through Multi-pattern Anti-tampering based
                  on Native Detection},
  journal      = {CoRR},
  volume       = {abs/2012.09292},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.09292},
  eprinttype    = {arXiv},
  eprint       = {2012.09292},
  timestamp    = {Sun, 03 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-09292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BaddarMM19,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {Behavioral-Anomaly Detection in Forensics Analysis},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {1},
  pages        = {55--62},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2894917},
  doi          = {10.1109/MSEC.2019.2894917},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BaddarMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CaputoVAM19,
  author       = {Davide Caputo and
                  Luca Verderame and
                  Simone Aonzo and
                  Alessio Merlo},
  editor       = {Simon N. Foley},
  title        = {Droids in Disarray: Detecting Frame Confusion in Hybrid Android Apps},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {121--139},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_7},
  doi          = {10.1007/978-3-030-22479-0\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CaputoVAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/GuerarVMM19,
  author       = {Meriem Guerar and
                  Luca Verderame and
                  Alessio Merlo and
                  Mauro Migliardi},
  editor       = {Bipin C. Desai and
                  Dimosthenis Anagnostopoulos and
                  Yannis Manolopoulos and
                  Mara Nikolaidou},
  title        = {Blockchain-based risk mitigation for invoice financing},
  booktitle    = {Proceedings of the 23rd International Database Applications {\&}
                  Engineering Symposium, {IDEAS} 2019, Athens, Greece, June 10-12, 2019},
  pages        = {20:1--20:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3331076.3331093},
  doi          = {10.1145/3331076.3331093},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ideas/GuerarVMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/RussoVM19,
  author       = {Enrico Russo and
                  Luca Verderame and
                  Alessio Merlo},
  editor       = {Sumitra Reddy},
  title        = {Towards Policy-Driven Monitoring of Fog Applications},
  booktitle    = {28th {IEEE} International Conference on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises, {WETICE} 2019, Naples, Italy, June
                  12-14, 2019},
  pages        = {93--97},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WETICE.2019.00026},
  doi          = {10.1109/WETICE.2019.00026},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wetice/RussoVM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/GuerarVMM19,
  author       = {Meriem Guerar and
                  Luca Verderame and
                  Mauro Migliardi and
                  Alessio Merlo},
  editor       = {Sumitra Reddy},
  title        = {2GesturePIN: Securing PIN-Based Authentication on Smartwatches},
  booktitle    = {28th {IEEE} International Conference on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises, {WETICE} 2019, Naples, Italy, June
                  12-14, 2019},
  pages        = {327--333},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WETICE.2019.00074},
  doi          = {10.1109/WETICE.2019.00074},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/GuerarVMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DejonCVAM19,
  author       = {Nicolas Dejon and
                  Davide Caputo and
                  Luca Verderame and
                  Alessandro Armando and
                  Alessio Merlo},
  editor       = {Maryline Laurent and
                  Thanassis Giannetsos},
  title        = {Automated Security Analysis of IoT Software Updates},
  booktitle    = {Information Security Theory and Practice - 13th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2019, Paris, France, December 11-12, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12024},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41702-4\_14},
  doi          = {10.1007/978-3-030-41702-4\_14},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wistp/DejonCVAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaddarMMP18,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Francesco Palmieri},
  title        = {Saving energy in aggressive intrusion detection through dynamic latency
                  sensitivity recognition},
  journal      = {Comput. Secur.},
  volume       = {76},
  pages        = {311--326},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.12.003},
  doi          = {10.1016/J.COSE.2017.12.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaddarMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuerarMMP18,
  author       = {Meriem Guerar and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Francesco Palmieri},
  title        = {Invisible {CAPPCHA:} {A} usable mechanism to distinguish between malware
                  and humans on the mobile IoT},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {255--266},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.007},
  doi          = {10.1016/J.COSE.2018.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuerarMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LimetMS18,
  author       = {S{\'{e}}bastien Limet and
                  Alessio Merlo and
                  Luca Spalazzi},
  title        = {{HPC} {\&} Co strike back: Where are distributed paradigms heading
                  toward?},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {30},
  number       = {9},
  year         = {2018},
  url          = {https://doi.org/10.1002/cpe.4431},
  doi          = {10.1002/CPE.4431},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LimetMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/CostaMVA18,
  author       = {Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame and
                  Alessandro Armando},
  title        = {Automatic security verification of mobile app configurations},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {519--536},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.06.014},
  doi          = {10.1016/J.FUTURE.2016.06.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/CostaMVA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GuerarMM18,
  author       = {Meriem Guerar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {Completely Automated Public Physical test to tell Computers and Humans
                  Apart: {A} usability study on mobile devices},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {82},
  pages        = {617--630},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.03.012},
  doi          = {10.1016/J.FUTURE.2017.03.012},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/GuerarMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuerarMMBPC18,
  author       = {Meriem Guerar and
                  Mauro Migliardi and
                  Alessio Merlo and
                  Mohamed Benmohammed and
                  Francesco Palmieri and
                  Aniello Castiglione},
  title        = {Using Screen Brightness to Improve Security in Mobile Social Network
                  Access},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {621--632},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2601603},
  doi          = {10.1109/TDSC.2016.2601603},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GuerarMMBPC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CaviglioneMM18,
  author       = {Luca Caviglione and
                  Alessio Merlo and
                  Mauro Migliardi},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Marek R. Ogiela and
                  Lidia Ogiela and
                  Nadeem Javaid},
  title        = {Covert Channels in IoT Deployments Through Data Hiding Techniques},
  booktitle    = {32nd International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2018 workshops, Krakow, Poland, May
                  16-18, 2018},
  pages        = {559--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/WAINA.2018.00144},
  doi          = {10.1109/WAINA.2018.00144},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CaviglioneMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AonzoMTF18,
  author       = {Simone Aonzo and
                  Alessio Merlo and
                  Giulio Tavella and
                  Yanick Fratantonio},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {Phishing Attacks on Modern Android},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1788--1801},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243778},
  doi          = {10.1145/3243734.3243778},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AonzoMTF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ContiRMMV18,
  author       = {Vincenzo Conti and
                  Simone Sante Ruffo and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Salvatore Vitabile},
  editor       = {Arcangelo Castiglione and
                  Florin Pop and
                  Massimo Ficco and
                  Francesco Palmieri},
  title        = {A Bio-inspired Approach to Attack Graphs Analysis},
  booktitle    = {Cyberspace Safety and Security - 10th International Symposium, {CSS}
                  2018, Amalfi, Italy, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11161},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01689-0\_5},
  doi          = {10.1007/978-3-030-01689-0\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/ContiRMMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucami/PedriniMFM18,
  author       = {Davide Pedrini and
                  Mauro Migliardi and
                  Carlo Ferrari and
                  Alessio Merlo},
  editor       = {Jos{\'{e}} Bravo and
                  Oresti Ba{\~{n}}os},
  title        = {On The Case of Blockchain Adoption in the Internet of Things},
  booktitle    = {12th International Conference on Ubiquitous Computing and Ambient
                  Intelligence, UCAmI 2018, Punta Cana, Dominican Republic, December
                  4-7, 2018},
  series       = {{MDPI} Proceedings},
  volume       = {2},
  number       = {19},
  pages        = {1231},
  publisher    = {{MDPI}},
  year         = {2018},
  url          = {https://doi.org/10.3390/proceedings2191231},
  doi          = {10.3390/PROCEEDINGS2191231},
  timestamp    = {Mon, 07 Nov 2022 21:23:28 +0100},
  biburl       = {https://dblp.org/rec/conf/ucami/PedriniMFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GuerarMM17,
  author       = {Meriem Guerar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {ClickPattern: {A} Pattern Lock System Resilient to Smudge and Side-channel
                  Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {2},
  pages        = {64--78},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.06.31.064},
  doi          = {10.22667/JOWUA.2017.06.31.064},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GuerarMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/MigliardiMB17,
  author       = {Mauro Migliardi and
                  Alessio Merlo and
                  Sherenaz W. Al{-}Haj Baddar},
  editor       = {Leonard Barolli and
                  Olivier Terzo},
  title        = {Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications},
  booktitle    = {Complex, Intelligent, and Software Intensive Systems - Proceedings
                  of the 11th International Conference on Complex, Intelligent, and
                  Software Intensive Systems (CISIS-2017), Torino, Italy, July 10-12,
                  2017},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {611},
  pages        = {1019--1026},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61566-0\_96},
  doi          = {10.1007/978-3-319-61566-0\_96},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/MigliardiMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/BaddarMMP17,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Francesco Palmieri},
  editor       = {Man Ho Allen Au and
                  Arcangelo Castiglione and
                  Kim{-}Kwang Raymond Choo and
                  Francesco Palmieri and
                  Kuan{-}Ching Li},
  title        = {Dynamic Latency Sensitivity Recognition: An Application to Energy
                  Saving},
  booktitle    = {Green, Pervasive, and Cloud Computing - 12th International Conference,
                  {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10232},
  pages        = {138--151},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57186-7\_12},
  doi          = {10.1007/978-3-319-57186-7\_12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/BaddarMMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gpc/Merlo17,
  author       = {Alessio Merlo},
  editor       = {Man Ho Allen Au and
                  Arcangelo Castiglione and
                  Kim{-}Kwang Raymond Choo and
                  Francesco Palmieri and
                  Kuan{-}Ching Li},
  title        = {BYODCert: Toward a Cross-Organizational {BYOD} Paradigm},
  booktitle    = {Green, Pervasive, and Cloud Computing - 12th International Conference,
                  {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10232},
  pages        = {725--735},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-57186-7\_52},
  doi          = {10.1007/978-3-319-57186-7\_52},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gpc/Merlo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/Merlo17,
  author       = {Alessio Merlo},
  title        = {From {HPC} to Security: How to Change Research Focus and Survive -
                  {A} Career Perspective},
  booktitle    = {2017 International Conference on High Performance Computing {\&}
                  Simulation, {HPCS} 2017, Genoa, Italy, July 17-21, 2017},
  pages        = {911--912},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/HPCS.2017.152},
  doi          = {10.1109/HPCS.2017.152},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/Merlo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/MerloG17,
  author       = {Alessio Merlo and
                  Gabriel Claudiu Georgiu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {RiskInDroid: Machine Learning-Based Risk Analysis on Android},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {538--552},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_36},
  doi          = {10.1007/978-3-319-58469-0\_36},
  timestamp    = {Wed, 17 May 2017 12:30:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/MerloG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AonzoLM17,
  author       = {Simone Aonzo and
                  Giovanni Lagorio and
                  Alessio Merlo},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {RmPerm: {A} Tool for Android Permissions Removal},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {319--326},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006420203190326},
  doi          = {10.5220/0006420203190326},
  timestamp    = {Thu, 17 Aug 2017 18:31:18 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AonzoLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igpl/MerloSM16,
  author       = {Alessio Merlo and
                  Elena Spadacini and
                  Mauro Migliardi},
  title        = {IPS-based reduction of network energy consumption},
  journal      = {Log. J. {IGPL}},
  volume       = {24},
  number       = {6},
  pages        = {982--995},
  year         = {2016},
  url          = {https://doi.org/10.1093/jigpal/jzw053},
  doi          = {10.1093/JIGPAL/JZW053},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/igpl/MerloSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/BaddarMM16,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {Generating statistical insights into network behavior using {SKETURE}},
  journal      = {J. High Speed Networks},
  volume       = {22},
  number       = {1},
  pages        = {65--76},
  year         = {2016},
  url          = {https://doi.org/10.3233/JHS-160539},
  doi          = {10.3233/JHS-160539},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/BaddarMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MerloCVA16,
  author       = {Alessio Merlo and
                  Gabriele Costa and
                  Luca Verderame and
                  Alessandro Armando},
  title        = {Android vs. SEAndroid: An empirical assessment},
  journal      = {Pervasive Mob. Comput.},
  volume       = {30},
  pages        = {113--131},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2016.01.006},
  doi          = {10.1016/J.PMCJ.2016.01.006},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/MerloCVA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/MerloMS16,
  author       = {Alessio Merlo and
                  Mauro Migliardi and
                  Elena Spadacini},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Antonio J. Jara and
                  Yann Bocchi},
  title        = {Balancing Delays and Energy Consumption in IPS-Enabled Networks},
  booktitle    = {30th International Conference on Advanced Information Networking and
                  Applications Workshops, {AINA} 2016 Workshops, Crans-Montana, Switzerland,
                  March 23-25, 2016},
  pages        = {267--272},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/WAINA.2016.109},
  doi          = {10.1109/WAINA.2016.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/MerloMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CostaGMY16,
  author       = {Gabriele Costa and
                  Paolo Gasti and
                  Alessio Merlo and
                  Shunt{-}Hsi Yu},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {{FLEX:} {A} Flexible Code Authentication Framework for Delegating
                  Mobile App Customization},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {389--400},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897887},
  doi          = {10.1145/2897845.2897887},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CostaGMY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcis/Armando0MVW16,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame and
                  Konrad S. Wrona},
  title        = {Developing a {NATO} {BYOD} security policy},
  booktitle    = {International Conference on Military Communications and Information
                  Systems, {ICMCIS} 2016, Brussels, Belgium, May 23-24, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICMCIS.2016.7496587},
  doi          = {10.1109/ICMCIS.2016.7496587},
  timestamp    = {Mon, 22 Apr 2024 10:35:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcis/Armando0MVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/MerloLV16,
  author       = {Alessio Merlo and
                  Luca Lorrai and
                  Luca Verderame},
  title        = {Efficient trusted host-based card emulation on TEE-enabled Android
                  devices},
  booktitle    = {International Conference on High Performance Computing {\&} Simulation,
                  {HPCS} 2016, Innsbruck, Austria, July 18-22, 2016},
  pages        = {454--459},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/HPCSim.2016.7568370},
  doi          = {10.1109/HPCSIM.2016.7568370},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/MerloLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArmandoCMV15,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Formal modeling and automatic enforcement of Bring Your Own Device
                  policies},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {2},
  pages        = {123--140},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0252-y},
  doi          = {10.1007/S10207-014-0252-Y},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArmandoCMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MerloMF15,
  author       = {Alessio Merlo and
                  Mauro Migliardi and
                  Paolo Fontanelli},
  title        = {Measuring and estimating power consumption in Android to support energy-based
                  intrusion detection},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {5},
  pages        = {611--637},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-150530},
  doi          = {10.3233/JCS-150530},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MerloMF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MerloMC15,
  author       = {Alessio Merlo and
                  Mauro Migliardi and
                  Luca Caviglione},
  title        = {A survey on energy-aware security mechanisms},
  journal      = {Pervasive Mob. Comput.},
  volume       = {24},
  pages        = {77--90},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.pmcj.2015.05.005},
  doi          = {10.1016/J.PMCJ.2015.05.005},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/MerloMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/MigliardiMP15,
  author       = {Mauro Migliardi and
                  Alessio Merlo and
                  Andrea Passaglia},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Fabrizio Messina and
                  Marek R. Ogiela},
  title        = {On the Feasibility of Moderating a Peer-to-Peer {CDN} System: {A}
                  Proof-of-Concept Implementation},
  booktitle    = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet
                  Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015},
  pages        = {689--694},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/3PGCIC.2015.53},
  doi          = {10.1109/3PGCIC.2015.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/3pgcic/MigliardiMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmandoBCMMRTV15,
  author       = {Alessandro Armando and
                  Gianluca Bocci and
                  Gabriele Costa and
                  Rocco Mammoliti and
                  Alessio Merlo and
                  Silvio Ranise and
                  Riccardo Traverso and
                  Andrea Valenza},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {41--49},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808786},
  doi          = {10.1145/2808783.2808786},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmandoBCMMRTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaddarMM15,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi},
  editor       = {Elisa Bertino and
                  Ilsun You},
  title        = {{SKETURE:} {A} Sketch-based Packet Analysis Tool},
  booktitle    = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing
                  Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October
                  16, 2015},
  pages        = {67--70},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808783.2808791},
  doi          = {10.1145/2808783.2808791},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BaddarMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArmandoCCM15,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Gabriele Costa and
                  Alessio Merlo},
  editor       = {C{\'{e}}dric Fournet and
                  Michael W. Hicks and
                  Luca Vigan{\`{o}}},
  title        = {Android Permissions Unleashed},
  booktitle    = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona,
                  Italy, 13-17 July, 2015},
  pages        = {320--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSF.2015.29},
  doi          = {10.1109/CSF.2015.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArmandoCCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/GuerarMMBM15,
  author       = {Meriem Guerar and
                  Mauro Migliardi and
                  Alessio Merlo and
                  Mohamed Benmohammed and
                  Belhadri Messabih},
  title        = {A Completely Automatic Public Physical test to tell Computers and
                  Humans Apart: {A} way to enhance authentication schemes in mobile
                  devices},
  booktitle    = {2015 International Conference on High Performance Computing {\&}
                  Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015},
  pages        = {203--210},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCSim.2015.7237041},
  doi          = {10.1109/HPCSIM.2015.7237041},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/GuerarMMBM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/ArmandoMV15,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Trusted host-based card emulation},
  booktitle    = {2015 International Conference on High Performance Computing {\&}
                  Simulation, {HPCS} 2015, Amsterdam, Netherlands, July 20-24, 2015},
  pages        = {221--228},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/HPCSim.2015.7237043},
  doi          = {10.1109/HPCSIM.2015.7237043},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/ArmandoMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoBCCMMM15,
  author       = {Alessandro Armando and
                  Gianluca Bocci and
                  Giantonio Chiarelli and
                  Gabriele Costa and
                  Gabriele De Maglie and
                  Rocco Mammoliti and
                  Alessio Merlo},
  editor       = {Christel Baier and
                  Cesare Tinelli},
  title        = {{SAM:} The Static Analysis Module of the {MAVERIC} Mobile App Security
                  Verification Platform},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 21st International Conference, {TACAS} 2015, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2015, London, UK, April 11-18, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9035},
  pages        = {225--230},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46681-0\_19},
  doi          = {10.1007/978-3-662-46681-0\_19},
  timestamp    = {Sat, 30 Sep 2023 09:57:43 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoBCCMMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/ArmandoCVM14,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Securing the "Bring Your Own Device" Paradigm},
  journal      = {Computer},
  volume       = {47},
  number       = {6},
  pages        = {48--56},
  year         = {2014},
  url          = {https://doi.org/10.1109/MC.2014.164},
  doi          = {10.1109/MC.2014.164},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/ArmandoCVM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ArmandoMV14,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Security considerations related to the use of mobile devices in the
                  operation of critical infrastructures},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {7},
  number       = {4},
  pages        = {247--256},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ijcip.2014.10.002},
  doi          = {10.1016/J.IJCIP.2014.10.002},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ArmandoMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/CaviglioneCM14,
  author       = {Luca Caviglione and
                  Mauro Coccoli and
                  Alessio Merlo},
  title        = {A taxonomy-based model of security and privacy in online social networks},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {9},
  number       = {4},
  pages        = {325--338},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJCSE.2014.060717},
  doi          = {10.1504/IJCSE.2014.060717},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/CaviglioneCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BaddarMM14,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {Anomaly Detection in Computer Networks: {A} State-of-the-Art Review},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {29--64},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.029},
  doi          = {10.22667/JOWUA.2014.12.31.029},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaddarMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ArmandoCCMMM14,
  author       = {Alessandro Armando and
                  Giantonio Chiarelli and
                  Gabriele Costa and
                  Gabriele De Maglie and
                  Rocco Mammoliti and
                  Alessio Merlo},
  title        = {Mobile App Security Analysis with the MAVeriC Static Analysis Module},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {103--119},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.103},
  doi          = {10.22667/JOWUA.2014.12.31.103},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ArmandoCCMMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MerloMGPC14,
  author       = {Alessio Merlo and
                  Mauro Migliardi and
                  Nicola Gobbo and
                  Francesco Palmieri and
                  Aniello Castiglione},
  title        = {A Denial of Service Attack to {UMTS} Networks Using SIM-Less Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {3},
  pages        = {280--291},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2014.2315198},
  doi          = {10.1109/TDSC.2014.2315198},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MerloMGPC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcs/MerloMF14,
  author       = {Alessio Merlo and
                  Mauro Migliardi and
                  Paolo Fontanelli},
  title        = {On energy-based profiling of malware in Android},
  booktitle    = {International Conference on High Performance Computing {\&} Simulation,
                  {HPCS} 2014, Bologna, Italy, 21-25 July, 2014},
  pages        = {535--542},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/HPCSim.2014.6903732},
  doi          = {10.1109/HPCSIM.2014.6903732},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcs/MerloMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/MigliardiMC14,
  author       = {Mauro Migliardi and
                  Alessio Merlo and
                  Luca Caviglione},
  title        = {A Survey of Green, Energy-Aware Security and Some of Its Recent Developments
                  in Networking and Mobile Computing},
  booktitle    = {Eighth International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United
                  Kingdom, 2-4 July, 2014},
  pages        = {241--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IMIS.2014.30},
  doi          = {10.1109/IMIS.2014.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/MigliardiMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/MigliardiMT14,
  author       = {Mauro Migliardi and
                  Alessio Merlo and
                  Marco Tettamanti},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Francesco Palmieri and
                  Mario Koeppen and
                  Vincenzo Loia},
  title        = {Reducing Energy Consumption in Prospective Memory Support System through
                  Hierarchical Positioning Algorithm},
  booktitle    = {2014 International Conference on Intelligent Networking and Collaborative
                  Systems, Salerno, Italy, September 10-12, 2014},
  pages        = {575--580},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INCoS.2014.47},
  doi          = {10.1109/INCOS.2014.47},
  timestamp    = {Wed, 06 Jan 2021 11:52:38 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/MigliardiMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/softcomp/MerloMRS14,
  author       = {Alessio Merlo and
                  Mauro Migliardi and
                  Diego Raso and
                  Elena Spadacini},
  editor       = {Jos{\'{e}} Gaviria de la Puerta and
                  Iv{\'{a}}n Garc{\'{\i}}a{-}Ferreira and
                  Pablo Garc{\'{\i}}a Bringas and
                  Fanny Klett and
                  Ajith Abraham and
                  Andr{\'{e}} C. P. L. F. de Carvalho and
                  {\'{A}}lvaro Herrero and
                  Bruno Baruque and
                  H{\'{e}}ctor Quinti{\'{a}}n and
                  Emilio Corchado},
  title        = {Optimizing Network Energy Consumption through Intrusion Prevention
                  Systems},
  booktitle    = {International Joint Conference SOCO'14-CISIS'14-ICEUTE'14 - Bilbao,
                  Spain, June 25th-27th, 2014, Proceedings},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {299},
  pages        = {505--515},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07995-0\_50},
  doi          = {10.1007/978-3-319-07995-0\_50},
  timestamp    = {Fri, 12 Aug 2022 13:44:55 +0200},
  biburl       = {https://dblp.org/rec/conf/softcomp/MerloMRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/ArmandoCMV14,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  editor       = {Gergely {\'{A}}cs and
                  Andrew P. Martin and
                  Ivan Martinovic and
                  Claude Castelluccia and
                  Patrick Traynor},
  title        = {Enabling {BYOD} through secure meta-market},
  booktitle    = {7th {ACM} Conference on Security {\&} Privacy in Wireless and
                  Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014},
  pages        = {219--230},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2627393.2627410},
  doi          = {10.1145/2627393.2627410},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/ArmandoCMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArmandoMMV13,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Luca Verderame},
  title        = {Breaking and fixing the Android Launching Flow},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {104--115},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.009},
  doi          = {10.1016/J.COSE.2013.03.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArmandoMMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Merlo13,
  author       = {Alessio Merlo},
  title        = {Secure cooperative access control on grid},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {29},
  number       = {2},
  pages        = {497--508},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.future.2012.08.001},
  doi          = {10.1016/J.FUTURE.2012.08.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/Merlo13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/igpl/AielloMP13,
  author       = {Maurizio Aiello and
                  Alessio Merlo and
                  Gianluca Papaleo},
  title        = {Performance assessment and analysis of {DNS} tunneling tools},
  journal      = {Log. J. {IGPL}},
  volume       = {21},
  number       = {4},
  pages        = {592--602},
  year         = {2013},
  url          = {https://doi.org/10.1093/jigpal/jzs029},
  doi          = {10.1093/JIGPAL/JZS029},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/igpl/AielloMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/MigliardiM13,
  author       = {Mauro Migliardi and
                  Alessio Merlo},
  title        = {Improving energy efficiency in distributed intrusion detection systems},
  journal      = {J. High Speed Networks},
  volume       = {19},
  number       = {3},
  pages        = {251--264},
  year         = {2013},
  url          = {https://doi.org/10.3233/JHS-130476},
  doi          = {10.3233/JHS-130476},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/MigliardiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/GobboMM13,
  author       = {Nicola Gobbo and
                  Alessio Merlo and
                  Mauro Migliardi},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {A Denial of Service Attack to {GSM} Networks via Attach Procedure},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_25},
  doi          = {10.1007/978-3-642-40588-4\_25},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/GobboMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/MigliardiM13,
  author       = {Mauro Migliardi and
                  Alessio Merlo},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Makoto Takizawa and
                  Tomoya Enokido and
                  Hui{-}Huang Hsu},
  title        = {Energy Consumption Simulation of Different Distributed Intrusion Detection
                  Approaches},
  booktitle    = {27th International Conference on Advanced Information Networking and
                  Applications Workshops, {WAINA} 2013, Barcelona, Spain, March 25-28,
                  2013},
  pages        = {1547--1552},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WAINA.2013.214},
  doi          = {10.1109/WAINA.2013.214},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/MigliardiM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ArmandoCCFMVY13,
  author       = {Alessandro Armando and
                  Aniello Castiglione and
                  Gabriele Costa and
                  Ugo Fiore and
                  Alessio Merlo and
                  Luca Verderame and
                  Ilsun You},
  editor       = {Khabib Mustofa and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Edgar R. Weippl and
                  Ilsun You},
  title        = {Trustworthy Opportunistic Access to the Internet of Services},
  booktitle    = {Information and Communicatiaon Technology - International Conference,
                  ICT-EurAsia 2013, Yogyakarta, Indonesia, March 25-29, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7804},
  pages        = {469--478},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36818-9\_52},
  doi          = {10.1007/978-3-642-36818-9\_52},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/ArmandoCCFMVY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieeehpcs/CurtiMMS13,
  author       = {Monica Curti and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Simone Schiappacasse},
  title        = {Towards energy-aware intrusion detection systems on mobile devices},
  booktitle    = {International Conference on High Performance Computing {\&} Simulation,
                  {HPCS} 2013, Helsinki, Finland, July 1-5, 2013},
  pages        = {289--296},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HPCSim.2013.6641428},
  doi          = {10.1109/HPCSIM.2013.6641428},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ieeehpcs/CurtiMMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ArmandoCM13,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo},
  editor       = {Sung Y. Shin and
                  Jos{\'{e}} Carlos Maldonado},
  title        = {Bring your own device, securely},
  booktitle    = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
                  {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages        = {1852--1858},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2480362.2480707},
  doi          = {10.1145/2480362.2480707},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/ArmandoCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ArmandoMV13,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  editor       = {Lech J. Janczewski and
                  Henry B. Wolfe and
                  Sujeet Shenoi},
  title        = {An Empirical Evaluation of the Android Security Framework},
  booktitle    = {Security and Privacy Protection in Information Processing Systems
                  - 28th {IFIP} {TC} 11 International Conference, {SEC} 2013, Auckland,
                  New Zealand, July 8-10, 2013. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {405},
  pages        = {176--189},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39218-4\_14},
  doi          = {10.1007/978-3-642-39218-4\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ArmandoMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/CostaMV13,
  author       = {Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Market-Based Security for Mobile Devices},
  journal      = {{ERCIM} News},
  volume       = {2013},
  number       = {93},
  year         = {2013},
  url          = {http://ercim-news.ercim.eu/en93/special/market-based-security-for-mobile-devices},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/CostaMV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ArmandoCMV12,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Securing the "Bring Your Own Device" Policy},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {3--17},
  year         = {2012},
  url          = {https://doi.org/10.22667/JISIS.2012.11.31.003},
  doi          = {10.22667/JISIS.2012.11.31.003},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ArmandoCMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ns/CaviglioneM12,
  author       = {Luca Caviglione and
                  Alessio Merlo},
  title        = {The energy impact of security mechanisms in modern mobile devices},
  journal      = {Netw. Secur.},
  volume       = {2012},
  number       = {2},
  pages        = {11--14},
  year         = {2012},
  url          = {https://doi.org/10.1016/S1353-4858(12)70015-6},
  doi          = {10.1016/S1353-4858(12)70015-6},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ns/CaviglioneM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ArmandoMMV12,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Luca Verderame},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Would You Mind Forking This Process? {A} Denial of Service Attack
                  on Android (and Some Countermeasures)},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_2},
  doi          = {10.1007/978-3-642-30436-1\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ArmandoMMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridsec/ArmandoCM12,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Alessio Merlo},
  editor       = {Jorge Cu{\'{e}}llar},
  title        = {Formal Analysis of a Privacy-Preserving Billing Protocol},
  booktitle    = {Smart Grid Security - First International Workshop, SmartGridSec 2012,
                  Berlin, Germany, December 3, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7823},
  pages        = {108--119},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38030-3\_8},
  doi          = {10.1007/978-3-642-38030-3\_8},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/smartgridsec/ArmandoCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tap/ArmandoPCMB12,
  author       = {Alessandro Armando and
                  Giancarlo Pellegrino and
                  Roberto Carbone and
                  Alessio Merlo and
                  Davide Balzarotti},
  editor       = {Achim D. Brucker and
                  Jacques Julliand},
  title        = {From Model-Checking to Automated Testing of Security Protocols: Bridging
                  the Gap},
  booktitle    = {Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague,
                  Czech Republic, May 31 - June 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7305},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30473-6\_3},
  doi          = {10.1007/978-3-642-30473-6\_3},
  timestamp    = {Tue, 23 Jun 2020 17:37:39 +0200},
  biburl       = {https://dblp.org/rec/conf/tap/ArmandoPCMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/ArmandoCM12,
  author       = {Alessandro Armando and
                  Gabriele Costa and
                  Alessio Merlo},
  editor       = {Catuscia Palamidessi and
                  Mark Dermot Ryan},
  title        = {Formal Modeling and Reasoning about the Android Security Framework},
  booktitle    = {Trustworthy Global Computing - 7th International Symposium, {TGC}
                  2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8191},
  pages        = {64--81},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-41157-1\_5},
  doi          = {10.1007/978-3-642-41157-1\_5},
  timestamp    = {Wed, 07 Dec 2022 23:14:04 +0100},
  biburl       = {https://dblp.org/rec/conf/tgc/ArmandoCM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1209-0687,
  author       = {Alessandro Armando and
                  Alessio Merlo and
                  Luca Verderame},
  title        = {Security Issues in the Android Cross-Layer Architecture},
  journal      = {CoRR},
  volume       = {abs/1209.0687},
  year         = {2012},
  url          = {http://arxiv.org/abs/1209.0687},
  eprinttype    = {arXiv},
  eprint       = {1209.0687},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1209-0687.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/MerloCCG11,
  author       = {Alessio Merlo and
                  Andrea Clematis and
                  Angelo Corana and
                  Vittoria Gianuzzi},
  title        = {Quality of Service on Grid: architectural and methodological issues},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {23},
  number       = {8},
  pages        = {745--766},
  year         = {2011},
  url          = {https://doi.org/10.1002/cpe.1641},
  doi          = {10.1002/CPE.1641},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/MerloCCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CaviglioneMM11,
  author       = {Luca Caviglione and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {What is Green Security?},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {366--371},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122781},
  doi          = {10.1109/ISIAS.2011.6122781},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CaviglioneMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/MerloPVA11,
  author       = {Alessio Merlo and
                  Gianluca Papaleo and
                  Stefano Veneziano and
                  Maurizio Aiello},
  editor       = {{\'{A}}lvaro Herrero and
                  Emilio Corchado},
  title        = {A Comparative Performance Evaluation of {DNS} Tunneling Tools},
  booktitle    = {Computational Intelligence in Security for Information Systems - 4th
                  International Conference, {CISIS} 2011, Held at {IWANN} 2011, Torremolinos-M{\'{a}}laga,
                  Spain, June 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6694},
  pages        = {84--91},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21323-6\_11},
  doi          = {10.1007/978-3-642-21323-6\_11},
  timestamp    = {Fri, 12 Aug 2022 13:44:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/MerloPVA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipro/MigliardiM11,
  author       = {Mauro Migliardi and
                  Alessio Merlo},
  title        = {Modeling the energy consumption of distributed {IDS:} {A} step towards
                  Green security},
  booktitle    = {MIPRO, 2011 Proceedings of the 34th International Convention, Opatija,
                  Croatia, 23-27 May, 2011},
  pages        = {1452--1457},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/5967289/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mipro/MigliardiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/GastiM11,
  author       = {Paolo Gasti and
                  Alessio Merlo},
  title        = {On Re-use of randomness in broadcast encryption},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {36--43},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971961},
  doi          = {10.1109/PST.2011.5971961},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/GastiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MerloA10,
  author       = {Alessio Merlo and
                  Alessandro Armando},
  title        = {Cooperative access control for the Grid},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {228--233},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604068},
  doi          = {10.1109/ISIAS.2010.5604068},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MerloA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/GianuzziM10,
  author       = {Vittoria Gianuzzi and
                  Alessio Merlo},
  editor       = {Lu{\'{\i}}s Veiga and
                  Sotirios Terzis},
  title        = {Beaconing support in publish-subscribe middleware for vehicular applications},
  booktitle    = {Proceedings of the 2nd International Workshop on Middleware for Pervasive
                  Mobile and Embedded Computing {(M-MPAC} 2010), November 29, 2010,
                  Bangalore, India},
  pages        = {4},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1890791.1890795},
  doi          = {10.1145/1890791.1890795},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/GianuzziM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nca/GastiMCC10,
  author       = {Paolo Gasti and
                  Alessio Merlo and
                  Giuseppe Ciaccio and
                  Giovanni Chiola},
  title        = {On the Integrity of Network Coding-Based Anonymous {P2P} File Sharing
                  Networks},
  booktitle    = {Proceedings of The Ninth {IEEE} International Symposium on Networking
                  Computing and Applications, {NCA} 2010, July 15-17, 2010, Cambridge,
                  Massachusetts, {USA}},
  pages        = {192--197},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NCA.2010.34},
  doi          = {10.1109/NCA.2010.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nca/GastiMCC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/GianuzziDMC09,
  author       = {Vittoria Gianuzzi and
                  Daniele D'Agostino and
                  Alessio Merlo and
                  Andrea Clematis},
  title        = {Efficient management of resources and entities using the HyVonNe {P2P}
                  architecture},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {1},
  number       = {3},
  pages        = {216--226},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJGUC.2009.027649},
  doi          = {10.1504/IJGUC.2009.027649},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/GianuzziDMC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/ClematisDQCGM08,
  author       = {Andrea Clematis and
                  Daniele D'Agostino and
                  Alfonso Quarati and
                  Angelo Corana and
                  Vittoria Gianuzzi and
                  Alessio Merlo},
  editor       = {Fatos Xhafa and
                  Leonard Barolli},
  title        = {A Distributed Approach for Structured Resource Discovery on Grid},
  booktitle    = {Second International Conference on Complex, Intelligent and Software
                  Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University
                  of Catalonia, Barcelona, Spain},
  pages        = {117--125},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CISIS.2008.112},
  doi          = {10.1109/CISIS.2008.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/ClematisDQCGM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/GianuzziMCD08,
  author       = {Vittoria Gianuzzi and
                  Alessio Merlo and
                  Andrea Clematis and
                  Daniele D'Agostino},
  editor       = {Fatos Xhafa and
                  Leonard Barolli},
  title        = {Managing Networks of Mobiles Entities Using the HyVonNe {P2P} Architecture},
  booktitle    = {Second International Conference on Complex, Intelligent and Software
                  Intensive Systems (CISIS-2008), March 4th-7th, 2008, Technical University
                  of Catalonia, Barcelona, Spain},
  pages        = {335--341},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CISIS.2008.62},
  doi          = {10.1109/CISIS.2008.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisis/GianuzziMCD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/ClematisCDGM06,
  author       = {Andrea Clematis and
                  Angelo Corana and
                  Daniele D'Agostino and
                  Vittoria Gianuzzi and
                  Alessio Merlo},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {Resource Selection and Application Execution in a Grid: {A} Migration
                  Experience from {GT2} to {GT4}},
  booktitle    = {On the Move to Meaningful Internet Systems 2006: CoopIS, DOA, GADA,
                  and ODBASE, {OTM} Confederated International Conferences, CoopIS,
                  DOA, GADA, and {ODBASE} 2006, Montpellier, France, October 29 - November
                  3, 2006. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4276},
  pages        = {1132--1142},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11914952\_4},
  doi          = {10.1007/11914952\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/ClematisCDGM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics