Alessio Merlo

According to our database1, Alessio Merlo authored at least 72 papers between 2006 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Using Screen Brightness to Improve Security in Mobile Social Network Access.
IEEE Trans. Dependable Sec. Comput., 2018

Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices.
Future Generation Comp. Syst., 2018

Automatic security verification of mobile app configurations.
Future Generation Comp. Syst., 2018

HPC & Co strike back: Where are distributed paradigms heading toward?
Concurrency and Computation: Practice and Experience, 2018

Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT.
Computers & Security, 2018

Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition.
Computers & Security, 2018

A Bio-inspired Approach to Attack Graphs Analysis.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

Phishing Attacks on Modern Android.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Covert Channels in IoT Deployments Through Data Hiding Techniques.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
ClickPattern: A Pattern Lock System Resilient to Smudge and Side-channel Attacks.
JoWUA, 2017

RmPerm: A Tool for Android Permissions Removal.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

RiskInDroid: Machine Learning-Based Risk Analysis on Android.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

From HPC to Security: How to Change Research Focus and Survive - A Career Perspective.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

BYODCert: Toward a Cross-Organizational BYOD Paradigm.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Dynamic Latency Sensitivity Recognition: An Application to Energy Saving.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Reducing the Impact of Traffic Sanitization on Latency Sensitive Applications.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

2016
Android vs. SEAndroid: An empirical assessment.
Pervasive and Mobile Computing, 2016

Generating statistical insights into network behavior using SKETURE.
J. High Speed Networks, 2016

IPS-based reduction of network energy consumption.
Logic Journal of the IGPL, 2016

Efficient trusted host-based card emulation on TEE-enabled Android devices.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Balancing Delays and Energy Consumption in IPS-Enabled Networks.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
A survey on energy-aware security mechanisms.
Pervasive and Mobile Computing, 2015

Measuring and estimating power consumption in Android to support energy-based intrusion detection.
Journal of Computer Security, 2015

Formal modeling and automatic enforcement of Bring Your Own Device policies.
Int. J. Inf. Sec., 2015

SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015

A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Trusted host-based card emulation.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015

Android Permissions Unleashed.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

SKETURE: A Sketch-based Packet Analysis Tool.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Denial of Service Attack to UMTS Networks Using SIM-Less Devices.
IEEE Trans. Dependable Sec. Comput., 2014

Anomaly Detection in Computer Networks: A State-of-the-Art Review.
JoWUA, 2014

Mobile App Security Analysis with the MAVeriC Static Analysis Module.
JoWUA, 2014

A taxonomy-based model of security and privacy in online social networks.
IJCSE, 2014

Security considerations related to the use of mobile devices in the operation of critical infrastructures.
IJCIP, 2014

Securing the "Bring Your Own Device" Paradigm.
IEEE Computer, 2014

Enabling BYOD through secure meta-market.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Optimizing Network Energy Consumption through Intrusion Prevention Systems.
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014

Reducing Energy Consumption in Prospective Memory Support System through Hierarchical Positioning Algorithm.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

On energy-based profiling of malware in Android.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

2013
Improving energy efficiency in distributed intrusion detection systems.
J. High Speed Networks, 2013

Performance assessment and analysis of DNS tunneling tools.
Logic Journal of the IGPL, 2013

Secure cooperative access control on grid.
Future Generation Comp. Syst., 2013

Market-Based Security for Mobile Devices.
ERCIM News, 2013

Breaking and fixing the Android Launching Flow.
Computers & Security, 2013

An Empirical Evaluation of the Android Security Framework.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Bring your own device, securely.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards energy-aware intrusion detection systems on mobile devices.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013

Trustworthy Opportunistic Access to the Internet of Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

A Denial of Service Attack to GSM Networks via Attach Procedure.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
The energy impact of security mechanisms in modern mobile devices.
Network Security, 2012

Securing the "Bring Your Own Device" Policy.
J. Internet Serv. Inf. Secur., 2012

Formal Modeling and Reasoning about the Android Security Framework.
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012

From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap.
Proceedings of the Tests and Proofs - 6th International Conference, 2012

Formal Analysis of a Privacy-Preserving Billing Protocol.
Proceedings of the Smart Grid Security - First International Workshop, 2012

Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures).
Proceedings of the Information Security and Privacy Research, 2012

2011
Quality of Service on Grid: architectural and methodological issues.
Concurrency and Computation: Practice and Experience, 2011

On Re-use of randomness in broadcast encryption.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Modeling the energy consumption of distributed IDS: A step towards Green security.
Proceedings of the MIPRO, 2011

A Comparative Performance Evaluation of DNS Tunneling Tools.
Proceedings of the Computational Intelligence in Security for Information Systems, 2011

What is Green Security?
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
On the Integrity of Network Coding-Based Anonymous P2P File Sharing Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Beaconing support in publish-subscribe middleware for vehicular applications.
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010

Cooperative access control for the Grid.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Efficient management of resources and entities using the HyVonNe P2P architecture.
IJGUC, 2009

2008
Managing Networks of Mobiles Entities Using the HyVonNe P2P Architecture.
Proceedings of the Second International Conference on Complex, 2008

A Distributed Approach for Structured Resource Discovery on Grid.
Proceedings of the Second International Conference on Complex, 2008

2006
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006


  Loading...