


default search action
Luigi Gallo
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Luigi Gallo 0001
— Pegaso University, Department of Information Science and Technology, Naples, Italy (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[c13]Gennaro Pio Rimoli, Luigi Gallo, Pietro Fusco
, Massimo Ficco:
Power Analysis of Post-quantum Cryptography NIST Algorithms in Resource-Constrained Microcontroller. AINA (8) 2025: 161-169
[c12]Peter Wafik
, Alessio Botta, Luigi Gallo, Gennaro Esposito Mocerino, Cornelia Herbert, Ivan Annicchiarico, Alia El Bolock, Slim Abdennadher:
Enhanced Predictive Clustering of User Profiles: A Model for Classifying Individuals Based on Email Interaction and Behavioral Patterns. ICISSP (2) 2025: 363-374
[c11]Patrizia Beraldi, Luigi Gallo, Alessandra Rende:
The Value of Perfect Forecasting in Optimizing the Management of Energy Communities. ICORES 2025: 177-185
[i1]Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero:
Tarallo: Evading Behavioral Malware Detectors in the Problem Space. CoRR abs/2506.02660 (2025)- 2024
[j5]Luigi Gallo
, Danilo Gentile
, Saverio Ruggiero, Alessio Botta
, Giorgio Ventre:
The human factor in phishing: Collecting and analyzing user behavior when reading emails. Comput. Secur. 139: 103671 (2024)
[j4]Giovanni Stanco, Alessio Botta, Luigi Gallo
, Giorgio Ventre:
DewROS2: A platform for informed Dew Robotics in ROS. Robotics Auton. Syst. 182: 104800 (2024)
[c10]Gabriele Digregorio
, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo
, Michele Carminati
, Mario Polino, Stefano Zanero:
Tarallo: Evading Behavioral Malware Detectors in the Problem Space. DIMVA 2024: 128-149
[c9]Gennaro Esposito Mocerino, Claudio Velotti, Danilo Gentile, Luigi Gallo
, Alessio Botta, Giorgio Ventre:
Work in Progress: Implicit Association Tests for Understanding Human Factor in Phishing Beyond Awareness. EuroS&P Workshops 2024: 519-526
[c8]Patrizia Beraldi, Luigi Gallo, Alessandra Rende:
A Learning Powered Bi-Level Approach for Dynamic Electricity Pricing. ICORES 2024: 390-397
[c7]William Fornaciari
, Giovanni Agosta
, Massimo Fioravanti
, Paolo Giuseppetti, Alessandro Solinas, Luigi Gallo
, Manuel Pernigotto, Mario Pedol, Francesco Pro, Irene Amerini, Lorenzo Papa, Luca Maiano, Giovanni Trovini, Mauro Di Giamberardino, Paolo Satta:
PMDI: An AI-Enabled Ecosystem for Cooperative Urban Mobility. SAMOS 2024: 231-246
[c6]Francesco Pietrantonio, Alessio Botta, Stefania Zinno, Giorgio Ventre, Luigi Gallo
, Laura Mancuso, Roberta Presta:
A Gaze-Based Analysis of Human Detection of Email Phishing. SVCC 2024: 1-8- 2023
[c5]Mario D'Onghia
, Federico Di Cesare
, Luigi Gallo
, Michele Carminati
, Mario Polino
, Stefano Zanero
:
Lookin' Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors. AISec@CCS 2023: 209-220
[c4]Francesco Pietrantonio, Alessio Botta, Giorgio Ventre, Luigi Gallo
, Stefania Zinno
, Laura Mancuso
, Roberta Presta:
Investigating Gaze Behavior in Phishing Email Identification. TMA 2023: 1-4- 2022
[b1]Luigi Gallo:
A Machine and Human Learning Approach for Phishing Defense. University of Naples Federico II, Italy, 2022- 2021
[j3]Luigi Gallo
, Alessandro Maiello
, Alessio Botta, Giorgio Ventre:
2 Years in the anti-phishing group of a large company. Comput. Secur. 105: 102259 (2021)- 2020
[c3]Antonia Affinito, Alessio Botta, Luigi Gallo
, Mauro Garofalo, Giorgio Ventre:
Spark-based port and net scan detection. SAC 2020: 1172-1179
2010 – 2019
- 2019
[c2]Luigi Gallo
, Alessio Botta, Giorgio Ventre:
Identifying threats in a large company's inbox. Big-DAMA@CoNEXT 2019: 1-7
[c1]Alessio Botta, Luigi Gallo
, Giorgio Ventre:
Cloud, Fog, and Dew Robotics: Architectures for Next Generation Applications. MobileCloud 2019: 16-23- 2018
[e4]Gabriella Sanniti di Baja, Luigi Gallo, Kokou Yétongnon, Albert Dipanda, Modesto Castrillón Santana, Richard Chbeir:
14th International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2018, Las Palmas de Gran Canaria, Spain, November 26-29, 2018. IEEE 2018, ISBN 978-1-5386-9385-8 [contents]- 2017
[e3]Kokou Yétongnon, Albert Dipanda, Richard Chbeir, Luigi Gallo, Neeta Nain:
13th International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2017, Jaipur, India, December 4-7, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-4283-2 [contents]- 2016
[e2]Kokou Yétongnon, Albert Dipanda, Richard Chbeir, Giuseppe De Pietro, Luigi Gallo:
12th International Conference on Signal-Image Technology & Internet-Based Systems, SITIS 2016, Naples, Italy, November 28 - December 1, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-5698-9 [contents]- 2012
[e1]Kokou Yétongnon, Richard Chbeir, Albert Dipanda, Luigi Gallo:
Eighth International Conference on Signal Image Technology and Internet Based Systems, SITIS 2012, Sorrento, Naples, Italy, November 25-29, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-5152-2 [contents]- 2011
[j2]Cornelia Kober, Luigi Gallo, Hans-Florian Zeilhofer, Robert Alexander Sader:
Computer-assisted analysis of human upper arm flexion by 4D-visualization based on MRI. Int. J. Comput. Assist. Radiol. Surg. 6(5): 675-684 (2011)
2000 – 2009
- 2007
[j1]Cornelia Kober, Yoshihiko Hayakawa
, Gero Kinzinger, Luigi Gallo, Mika Otonari-Yamamoto, Tsukasa Sano, Robert Alexander Sader:
3D-visualization of the temporomandibular joint with focus on the articular disc based on clinical T1-, T2-, and proton density weighted MR images. Int. J. Comput. Assist. Radiol. Surg. 2(3-4): 203-210 (2007)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-28 04:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







