Остановите войну!
for scientists:
default search action
Alessio Merlo
- > Home > Persons > Alessio Merlo
Publications
- 2023
- [j45]Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo:
LiDiTE: A Full-Fledged and Featherweight Digital Twin Framework. IEEE Trans. Dependable Secur. Comput. 20(6): 4899-4912 (2023) - [j44]Giacomo Longo, Enrico Russo, Alessandro Armando, Alessio Merlo:
Attacking (and Defending) the Maritime Radar System. IEEE Trans. Inf. Forensics Secur. 18: 3575-3589 (2023) - [c71]Giacomo Longo, Alessio Merlo, Alessandro Armando, Enrico Russo:
Electronic Attacks as a Cyber False Flag against Maritime Radars Systems. LCN 2023: 1-6 - 2022
- [c68]Marco Raimondi, Giacomo Longo, Alessio Merlo, Alessandro Armando, Enrico Russo:
Training the Maritime Security Operations Centre Teams. CSR 2022: 388-393 - [i14]Enrico Russo, Gabriele Costa, Giacomo Longo, Alessandro Armando, Alessio Merlo:
LiDiTE: a Full-Fledged and Featherweight Digital Twin Framework. CoRR abs/2202.06954 (2022) - [i13]Giacomo Longo, Enrico Russo, Alessandro Armando, Alessio Merlo:
Attacking (and defending) the Maritime Radar System. CoRR abs/2207.05623 (2022) - 2021
- [j39]Enrico Russo, Luca Verderame, Alessandro Armando, Alessio Merlo:
DIOXIN: runtime security policy enforcement of fog applications. Int. J. Grid Util. Comput. 12(2): 126-138 (2021) - 2019
- [c47]Nicolas Dejon, Davide Caputo, Luca Verderame, Alessandro Armando, Alessio Merlo:
Automated Security Analysis of IoT Software Updates. WISTP 2019: 223-239 - 2018
- [j24]Gabriele Costa, Alessio Merlo, Luca Verderame, Alessandro Armando:
Automatic security verification of mobile app configurations. Future Gener. Comput. Syst. 80: 519-536 (2018) - 2016
- [j18]Alessio Merlo, Gabriele Costa, Luca Verderame, Alessandro Armando:
Android vs. SEAndroid: An empirical assessment. Pervasive Mob. Comput. 30: 113-131 (2016) - [c34]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame, Konrad S. Wrona:
Developing a NATO BYOD security policy. ICMCIS 2016: 1-6 - 2015
- [j17]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Formal modeling and automatic enforcement of Bring Your Own Device policies. Int. J. Inf. Sec. 14(2): 123-140 (2015) - [c31]Alessandro Armando, Gianluca Bocci, Gabriele Costa, Rocco Mammoliti, Alessio Merlo, Silvio Ranise, Riccardo Traverso, Andrea Valenza:
Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module. MIST@CCS 2015: 41-49 - [c29]Alessandro Armando, Roberto Carbone, Gabriele Costa, Alessio Merlo:
Android Permissions Unleashed. CSF 2015: 320-333 - [c27]Alessandro Armando, Alessio Merlo, Luca Verderame:
Trusted host-based card emulation. HPCS 2015: 221-228 - [c26]Alessandro Armando, Gianluca Bocci, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform. TACAS 2015: 225-230 - 2014
- [j14]Alessandro Armando, Gabriele Costa, Luca Verderame, Alessio Merlo:
Securing the "Bring Your Own Device" Paradigm. Computer 47(6): 48-56 (2014) - [j13]Alessandro Armando, Alessio Merlo, Luca Verderame:
Security considerations related to the use of mobile devices in the operation of critical infrastructures. Int. J. Crit. Infrastructure Prot. 7(4): 247-256 (2014) - [j10]Alessandro Armando, Giantonio Chiarelli, Gabriele Costa, Gabriele De Maglie, Rocco Mammoliti, Alessio Merlo:
Mobile App Security Analysis with the MAVeriC Static Analysis Module. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(4): 103-119 (2014) - [c21]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Enabling BYOD through secure meta-market. WISEC 2014: 219-230 - 2013
- [j8]Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame:
Breaking and fixing the Android Launching Flow. Comput. Secur. 39: 104-115 (2013) - [c18]Alessandro Armando, Aniello Castiglione, Gabriele Costa, Ugo Fiore, Alessio Merlo, Luca Verderame, Ilsun You:
Trustworthy Opportunistic Access to the Internet of Services. ICT-EurAsia 2013: 469-478 - [c16]Alessandro Armando, Gabriele Costa, Alessio Merlo:
Bring your own device, securely. SAC 2013: 1852-1858 - [c15]Alessandro Armando, Alessio Merlo, Luca Verderame:
An Empirical Evaluation of the Android Security Framework. SEC 2013: 176-189 - 2012
- [j4]Alessandro Armando, Gabriele Costa, Alessio Merlo, Luca Verderame:
Securing the "Bring Your Own Device" Policy. J. Internet Serv. Inf. Secur. 2(3/4): 3-17 (2012) - [c14]Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame:
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). SEC 2012: 13-24 - [c13]Alessandro Armando, Roberto Carbone, Alessio Merlo:
Formal Analysis of a Privacy-Preserving Billing Protocol. SmartGridSec 2012: 108-119 - [c12]Alessandro Armando, Giancarlo Pellegrino, Roberto Carbone, Alessio Merlo, Davide Balzarotti:
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap. TAP@TOOLS 2012: 3-18 - [c11]Alessandro Armando, Gabriele Costa, Alessio Merlo:
Formal Modeling and Reasoning about the Android Security Framework. TGC 2012: 64-81 - [i1]Alessandro Armando, Alessio Merlo, Luca Verderame:
Security Issues in the Android Cross-Layer Architecture. CoRR abs/1209.0687 (2012) - 2010
- [c6]Alessio Merlo, Alessandro Armando:
Cooperative access control for the Grid. IAS 2010: 228-233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint