Gianluigi Me

According to our database1, Gianluigi Me authored at least 26 papers between 2002 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Discovering Hidden Relations Between Tor Marketplaces Users.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2015
Searching the Web for Illegal Content: The Anatomy of a Semantic Search Engine.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

A Survey on Financial Botnets Threat.
Proceedings of the Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security, 2015

2014
The Botnet Revenue Model.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Vertical Semantic Discovery: The SICH Approach on NPS.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Forensic disk image indexing and search in an HPC environment.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

Migration to Governmental Cloud Digital Forensics Community: Economics and Methodology.
Proceedings of the Economics of Grids, Clouds, Systems, and Services, 2014

2012
Triage-based automated analysis of evidence in court cases of copyright infringement.
Proceedings of IEEE International Conference on Communications, 2012

A Case Study on Digital Forensics in the Cloud.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
A Quantitative Approach to Triaging in Mobile Forensics.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2009
Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm.
IJESDF, 2009

Fast User Classifying to Establish Forensic Analysis Priorities.
Proceedings of the IMF 2009, 2009

Data reverse engineering on a smartphone.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2009

2008
Internal forensic acquisition for mobile equipments.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Trusted SMS - A Novel Framework for Non-repudiable SMS-based Processes.
Proceedings of the First International Conference on Health Informatics, 2008

Transaction Oriented Text Messaging with Trusted-SMS.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Investigation Strategy for the Small Pedophiles World.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

2006
Mobile Local Macropayments: Security and Prototyping.
IEEE Pervasive Computing, 2006

2005
A Two-Factor Mobile Authentication Scheme for Secure Financial Transactions.
Proceedings of the 2005 International Conference on Mobile Business (ICMB 2005), 2005

EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment Scheme.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Local Authentication with Bluetooth enabled Mobile Devices.
Proceedings of the Joint International Conference on Autonomic and Autonomous Systems 2005 / International Conference on Networking and Services 2005, 2005

2004
GSM and GPRS Performance of IPSEC Data Communication.
Proceedings of the ICETE 2004, 2004

2003
Security overview for m-payed virtual ticketing.
Proceedings of the IEEE 14th International Symposium on Personal, 2003

A Survey of PDA Forensic Investigation.
Proceedings of the International Conference on Wireless Networks, 2003

A Secure Mobile Local Payment Application Framework.
Proceedings of the International Conference on Security and Management, 2003

2002
M-Government to Narrow the Digital Divide.
Proceedings of the IADIS International Conference WWW/Internet 2002, 2002


  Loading...