MERLO, ALESSIO
 Distribuzione geografica
Continente #
EU - Europa 17.118
AS - Asia 255
SA - Sud America 78
NA - Nord America 13
AF - Africa 5
Totale 17.469
Nazione #
IT - Italia 17.116
CN - Cina 125
VN - Vietnam 57
SG - Singapore 55
BR - Brasile 54
AR - Argentina 12
US - Stati Uniti d'America 11
HK - Hong Kong 8
EC - Ecuador 5
ID - Indonesia 5
CO - Colombia 2
IN - India 2
MX - Messico 2
PE - Perù 2
PY - Paraguay 2
ZA - Sudafrica 2
AZ - Azerbaigian 1
CL - Cile 1
EG - Egitto 1
KE - Kenya 1
KZ - Kazakistan 1
MA - Marocco 1
PS - Palestinian Territory 1
RU - Federazione Russa 1
UA - Ucraina 1
Totale 17.469
Città #
Genova 10.472
Genoa 4.287
Rapallo 1.211
Vado Ligure 1.114
Beijing 51
Bordighera 26
Ho Chi Minh City 23
Singapore 18
Ashburn 11
Hanoi 10
Hong Kong 8
Tianjin 7
Biên Hòa 4
Buenos Aires 3
Bắc Ninh 3
Quảng Ngãi 3
Bogotá 2
Conselheiro Lafaiete 2
Guarulhos 2
Guayaquil 2
Jakarta 2
Lima 2
Lấp Vò 2
Porto Alegre 2
Rome 2
São Bernardo do Campo 2
São Paulo 2
Almirante Brown 1
Aracaju 1
Araruama 1
Astana 1
Asunción 1
Aurora 1
Baku 1
Bekasi 1
Bengaluru 1
Bezerros 1
Bình Dương 1
Cachoeiro de Itapemirim 1
Cairo 1
Cape Town 1
Contagem 1
Cotia 1
Cuenca 1
Curitibanos 1
Córdoba 1
Da Nang 1
Delhi 1
Dianópolis 1
Duque de Caxias 1
Faxinal 1
Federación 1
Fortaleza 1
Gravatá do Ibiapina 1
Guararema 1
Ha Long 1
Haiphong 1
Huế 1
Hải Dương 1
Ipatinga 1
Jacareí 1
Jaíba 1
Johannesburg 1
Joinville 1
Jussara 1
Mauá 1
Merlo 1
Mexico City 1
Moscow 1
Nairobi 1
Nha Trang 1
Ninh Bình 1
Niterói 1
Palmeira dos Índios 1
Pelotas 1
Phủ Lý 1
Piracicaba 1
Pirapora 1
Piritiba 1
Portoviejo 1
Quito 1
Ramallah 1
Recife 1
Rio Verde 1
Rio de Janeiro 1
Roca Sales 1
Rozzano 1
San Bernardo 1
San Miguel de Tucumán 1
Santo Antônio 1
Santo Tomé 1
Santos 1
Sapucaia do Sul 1
Sobral 1
São Caetano do Sul 1
São Gotardo 1
São José dos Pinhais 1
São João do Piauí 1
São Vicente 1
Tabatinga 1
Totale 17.346
Nome #
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 2.514
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications 195
Automatic security verification of mobile app configurations 191
Formal modeling and automatic enforcement of Bring Your Own Device policies 187
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 183
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture 183
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks 180
An Empirical Evaluation of the Android Security Framework 177
Using Screen Brightness to Improve Security in Mobile Social Network Access 177
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications 175
GridWalker: a visual tool for supporting the advanced discovery of Grid resources 173
Managing Networks of Mobiles Entities using the HyVonNe P2P Architecture 172
Android vs. SEAndroid: An empirical assessment 172
A denial of service attack to umts networks using sim-less devices 168
A Denial of Service Attack to GSM Networks via Attach Procedure 167
A Taxonomy-based Model of Security and Privacy in Online Social Networks 166
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT 162
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 161
A distributed approach for structured resource discovery on Grid 161
A survey on energy-aware security mechanisms 158
Attacking (and Defending) the Maritime Radar System 156
SortGrid: a Grid Framework compliant with Soft Real Time Requirements 156
A Comparative Performance Evaluation of DNS Tunneling Tools 152
Android Permissions Unleashed 152
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 151
Developing a NATO BYOD security policy 151
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices 151
Reducing the impact of traffic sanitization on latency sensitive applications 150
Trustworthy Opportunistic Access to the Internet of Services 146
Formal Modeling and Reasoning about the Android Security Framework 145
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices 143
Measuring and estimating power consumption in Android to support energy-based intrusion detection 139
Enabling BYOD through secure meta-market 138
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 136
Mobile app security assessment with the maveric dynamic analysis module 136
Trusted host-based card emulation 136
On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks 136
SoRTSim: A high-level simulator for the evaluation of QoS models on Grid 135
Social Network Engineering for Secure Web Data and Services 135
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4 135
Covert channels in IoT deployments through data hiding techniques 135
Phishing attacks on modern android 134
Breaking and fixing the Android Launching Flow 133
Bring your own device, securely 131
Dynamic latency sensitivity recognition: An application to energy saving 131
IPS-based reduction of network energy consumption 130
Balancing Delays and Energy Consumption in IPS-Enabled Networks 130
Cooperative Access Control for the Grid 128
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition 128
A bio-inspired approach to attack graphs analysis 128
On Social Network Engineering for Secure Web Data and Services 127
Mobile App Security Analysis with the MAVeriC Static Analysis Module 127
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches 126
RmPerm: A Tool for Android Permissions Removal 126
Performance assessment and analysis of DNS tunneling tools 126
On energy-based profiling of malware in Android 125
Reducing energy consumption in prospective memory support system through hierarchical positioning algorithm 125
Security considerations related to the use of mobile devices in the operation of critical infrastructures 124
Generating statistical insights into network behavior using SKETURE 124
Towards energy-aware intrusion detection systems on mobile devices 123
Behavioral Anomaly Detection in Forensics Analysis 122
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem 122
On the Feasibility of Moderating a Peer-To-Peer CDN System: A Proof-of-Concept Implementation 120
Automated Security Analysis of IoT Software Updates 119
Riskindroid: Machine Learning-Based risk analysis on Android 118
Modeling the energy consumption of Distributed IDS: a step towards Green Security 117
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 117
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 117
SoRTSim: A High-Level Simulator for the Evaluation of QoS Models on Grid 116
BYODCert: Toward a cross-organizational BYOD paradigm 116
The energy impact of security mechanisms in modern mobile devices 114
A cooperative model for resource sharing on grid 113
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 112
Formal Analysis of a Privacy-Preserving Billing Protocol 111
Quality of Service on Grid: Architectural and methodological issues 111
Low-Resource Footprint, Data-Driven Malware Detection on Android 111
Optimizing Network Energy Consumption through Intrusion Prevention Systems 111
On Re-use of randomness in broadcast encryption 110
Securing the ``Bring Your Own Device'' Paradigm 109
Anomaly Detection in Computer Networks: A State-of-the-Art Review 109
Droids in disarray: Detecting frame confusion in hybrid android apps 109
Securing PIN-based authentication in smartwatches with just two gestures 106
Fine-hearing Google Home: why silence will not protect your privacy 106
A secure cloud-edges computing architecture for metagenomics analysis 106
Market-based security for mobile devices 105
FLEX: A flexible code authentication framework for delegating mobile app customization 105
Securing the “bring your own device” policy 104
HPC & Co strike back: Where are distributed paradigms heading toward? 104
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 103
Blockchain-based risk mitigation for invoice financing 101
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures 99
From HPC to security: How to change research focus and survive - A career perspective 98
DIOXIN: runtime security policy enforcement of fog applications 97
Green-Aware Security: Towards a New Research Field 93
Using ETC framework in virtual laboratories for online students 89
Dispositivi mobili: nuovi problemi di sicurezza 84
Obfuscapk: An open-source black-box obfuscation tool for Android apps 84
null 83
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks 81
Improving energy efficiency in distributed intrusion detection systems 80
Totale 15.494
Categoria #
all - tutte 56.090
article - articoli 20.952
book - libri 0
conference - conferenze 26.089
curatela - curatele 405
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 8.644
Totale 112.180


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20213.269 0 0 0 0 51 149 647 913 764 549 97 99
2021/20221.490 25 101 161 147 79 87 128 311 80 146 70 155
2022/20231.510 138 108 26 96 202 272 18 137 308 10 146 49
2023/2024992 59 114 51 131 66 201 64 50 21 30 96 109
2024/20252.785 62 216 83 176 354 303 238 471 110 130 303 339
2025/20261.782 715 84 392 329 262 0 0 0 0 0 0 0
Totale 17.694