MERLO, ALESSIO
 Distribuzione geografica
Continente #
EU - Europa 17.442
AS - Asia 1.521
NA - Nord America 788
SA - Sud America 163
AF - Africa 38
Continente sconosciuto - Info sul continente non disponibili 1
OC - Oceania 1
Totale 19.954
Nazione #
IT - Italia 17.177
US - Stati Uniti d'America 748
SG - Singapore 649
CN - Cina 400
VN - Vietnam 266
FR - Francia 127
BR - Brasile 99
HK - Hong Kong 76
DE - Germania 43
JP - Giappone 33
AR - Argentina 28
GB - Regno Unito 24
ZA - Sudafrica 18
CA - Canada 17
IN - India 17
MX - Messico 14
NL - Olanda 12
IE - Irlanda 11
IQ - Iraq 11
FI - Finlandia 9
ID - Indonesia 9
BD - Bangladesh 8
CO - Colombia 8
EC - Ecuador 8
CL - Cile 6
MY - Malesia 6
PH - Filippine 6
EG - Egitto 5
ES - Italia 5
JO - Giordania 5
KE - Kenya 5
VE - Venezuela 5
AZ - Azerbaigian 4
PE - Perù 4
PK - Pakistan 4
PL - Polonia 4
RU - Federazione Russa 4
TW - Taiwan 4
AE - Emirati Arabi Uniti 3
HR - Croazia 3
JM - Giamaica 3
MA - Marocco 3
SA - Arabia Saudita 3
TR - Turchia 3
UZ - Uzbekistan 3
BW - Botswana 2
CH - Svizzera 2
CR - Costa Rica 2
DZ - Algeria 2
EE - Estonia 2
GR - Grecia 2
KR - Corea 2
NO - Norvegia 2
NP - Nepal 2
PS - Palestinian Territory 2
PY - Paraguay 2
RS - Serbia 2
SK - Slovacchia (Repubblica Slovacca) 2
TH - Thailandia 2
UA - Ucraina 2
UY - Uruguay 2
BE - Belgio 1
BG - Bulgaria 1
CZ - Repubblica Ceca 1
DK - Danimarca 1
ET - Etiopia 1
GT - Guatemala 1
GY - Guiana 1
IS - Islanda 1
KZ - Kazakistan 1
LC - Santa Lucia 1
LT - Lituania 1
MN - Mongolia 1
MT - Malta 1
NZ - Nuova Zelanda 1
PA - Panama 1
PT - Portogallo 1
QA - Qatar 1
SC - Seychelles 1
SE - Svezia 1
TN - Tunisia 1
TT - Trinidad e Tobago 1
XK - ???statistics.table.value.countryCode.XK??? 1
Totale 19.954
Città #
Genova 10.472
Genoa 4.287
Rapallo 1.211
Vado Ligure 1.114
Singapore 299
San Jose 229
Ashburn 144
Lauterbourg 111
Ho Chi Minh City 90
Hanoi 70
Hong Kong 70
Beijing 61
New York 44
Frankfurt am Main 35
Tokyo 31
Bordighera 26
Santa Clara 23
Haiphong 14
Los Angeles 13
Atlanta 12
Milan 11
Orem 11
Da Nang 10
Dublin 10
Montreal 10
St Louis 10
Johannesburg 9
Rome 9
São Paulo 9
Tianjin 9
Amsterdam 8
Helsinki 8
Mexico City 8
Council Bluffs 7
Hangzhou 7
Baghdad 6
Chicago 6
City of London 6
Hải Dương 6
London 6
Amman 5
Buenos Aires 5
Buffalo 5
Compiègne 5
Naples 5
Paris 5
Shanghai 5
Biên Hòa 4
Bogotá 4
Cape Town 4
Chennai 4
Houston 4
Nairobi 4
Virginia Beach 4
Warsaw 4
Baku 3
Bắc Ninh 3
Can Tho 3
Cardiff 3
Des Moines 3
Ha Kwai Chung 3
Kuala Lumpur 3
Lahore 3
Lima 3
Manchester 3
Manila 3
New Delhi 3
Nuremberg 3
Poplar 3
Porto Alegre 3
Quảng Ngãi 3
Rio de Janeiro 3
Santiago 3
Taipei 3
Tashkent 3
Venice 3
Zagreb 3
Ankara 2
Aurora 2
Bangkok 2
Belgrade 2
Belo Horizonte 2
Bergen 2
Bratislava 2
Bắc Giang 2
Cachoeiro de Itapemirim 2
Cagliari 2
Cairo 2
Calcio 2
Caracas 2
Catania 2
Columbus 2
Conselheiro Lafaiete 2
Cúcuta 2
Dallas 2
Denver 2
Duque de Caxias 2
Eindhoven 2
Falkenstein 2
Gaborone 2
Totale 18.701
Nome #
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 2.525
Automatic security verification of mobile app configurations 211
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications 210
Formal modeling and automatic enforcement of Bring Your Own Device policies 209
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 205
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture 203
Using Screen Brightness to Improve Security in Mobile Social Network Access 198
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks 198
An Empirical Evaluation of the Android Security Framework 192
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications 192
Managing Networks of Mobiles Entities using the HyVonNe P2P Architecture 191
A denial of service attack to umts networks using sim-less devices 191
A Denial of Service Attack to GSM Networks via Attach Procedure 186
GridWalker: a visual tool for supporting the advanced discovery of Grid resources 185
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT 185
A Taxonomy-based Model of Security and Privacy in Online Social Networks 184
Android vs. SEAndroid: An empirical assessment 184
A survey on energy-aware security mechanisms 183
Android Permissions Unleashed 183
Attacking (and Defending) the Maritime Radar System 181
A distributed approach for structured resource discovery on Grid 178
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 177
SortGrid: a Grid Framework compliant with Soft Real Time Requirements 172
Reducing the impact of traffic sanitization on latency sensitive applications 171
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 169
Developing a NATO BYOD security policy 169
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices 169
A Comparative Performance Evaluation of DNS Tunneling Tools 167
Formal Modeling and Reasoning about the Android Security Framework 165
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices 161
Trustworthy Opportunistic Access to the Internet of Services 160
Mobile App Security Analysis with the MAVeriC Static Analysis Module 159
Enabling BYOD through secure meta-market 157
Trusted host-based card emulation 157
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4 154
Breaking and fixing the Android Launching Flow 154
Covert channels in IoT deployments through data hiding techniques 154
Mobile app security assessment with the maveric dynamic analysis module 152
Measuring and estimating power consumption in Android to support energy-based intrusion detection 151
Dynamic latency sensitivity recognition: An application to energy saving 150
IPS-based reduction of network energy consumption 149
Phishing attacks on modern android 149
SoRTSim: A high-level simulator for the evaluation of QoS models on Grid 148
A bio-inspired approach to attack graphs analysis 148
Social Network Engineering for Secure Web Data and Services 147
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 147
Automated Security Analysis of IoT Software Updates 147
On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks 147
Securing PIN-based authentication in smartwatches with just two gestures 146
On Social Network Engineering for Secure Web Data and Services 145
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches 145
RmPerm: A Tool for Android Permissions Removal 145
On energy-based profiling of malware in Android 144
Bring your own device, securely 144
Balancing Delays and Energy Consumption in IPS-Enabled Networks 143
A secure cloud-edges computing architecture for metagenomics analysis 142
Reducing energy consumption in prospective memory support system through hierarchical positioning algorithm 141
Riskindroid: Machine Learning-Based risk analysis on Android 141
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition 141
Security considerations related to the use of mobile devices in the operation of critical infrastructures 139
Generating statistical insights into network behavior using SKETURE 138
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 138
Cooperative Access Control for the Grid 137
Behavioral Anomaly Detection in Forensics Analysis 137
Towards energy-aware intrusion detection systems on mobile devices 136
On the Feasibility of Moderating a Peer-To-Peer CDN System: A Proof-of-Concept Implementation 136
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem 136
Performance assessment and analysis of DNS tunneling tools 136
A cooperative model for resource sharing on grid 134
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 134
BYODCert: Toward a cross-organizational BYOD paradigm 134
Modeling the energy consumption of Distributed IDS: a step towards Green Security 133
Droids in disarray: Detecting frame confusion in hybrid android apps 133
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 133
Fine-hearing Google Home: why silence will not protect your privacy 133
Quality of Service on Grid: Architectural and methodological issues 126
The energy impact of security mechanisms in modern mobile devices 125
Formal Analysis of a Privacy-Preserving Billing Protocol 125
Anomaly Detection in Computer Networks: A State-of-the-Art Review 125
SoRTSim: A High-Level Simulator for the Evaluation of QoS Models on Grid 125
FLEX: A flexible code authentication framework for delegating mobile app customization 125
Low-Resource Footprint, Data-Driven Malware Detection on Android 125
Optimizing Network Energy Consumption through Intrusion Prevention Systems 124
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 123
On Re-use of randomness in broadcast encryption 119
Securing the ``Bring Your Own Device'' Paradigm 119
Securing the “bring your own device” policy 118
Market-based security for mobile devices 118
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures 117
Blockchain-based risk mitigation for invoice financing 114
HPC & Co strike back: Where are distributed paradigms heading toward? 113
DIOXIN: runtime security policy enforcement of fog applications 113
Obfuscapk: An open-source black-box obfuscation tool for Android apps 111
From HPC to security: How to change research focus and survive - A career perspective 111
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks 109
Green-Aware Security: Towards a New Research Field 105
Alice in (Software Supply) Chains: Risk Identification and Evaluation 102
Repack Me If You Can: An Anti-Repackaging Solution Based on Android Virtualization 102
Adversarial waypoint injection attacks on Maritime Autonomous Surface Ships (MASS) collision avoidance systems 102
Dispositivi mobili: nuovi problemi di sicurezza 101
Totale 17.265
Categoria #
all - tutte 60.539
article - articoli 22.845
book - libri 0
conference - conferenze 27.961
curatela - curatele 425
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 9.308
Totale 121.078


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/2021196 0 0 0 0 0 0 0 0 0 0 97 99
2021/20221.490 25 101 161 147 79 87 128 311 80 146 70 155
2022/20231.510 138 108 26 96 202 272 18 137 308 10 146 49
2023/2024992 59 114 51 131 66 201 64 50 21 30 96 109
2024/20252.785 62 216 83 176 354 303 238 471 110 130 303 339
2025/20264.267 715 84 392 329 631 432 740 166 411 356 11 0
Totale 20.179