MERLO, ALESSIO
 Distribuzione geografica
Continente #
EU - Europa 17.110
AS - Asia 32
SA - Sud America 31
AF - Africa 3
NA - Nord America 2
Totale 17.178
Nazione #
IT - Italia 17.110
BR - Brasile 25
CN - Cina 20
VN - Vietnam 6
AR - Argentina 3
SG - Singapore 3
ID - Indonesia 2
US - Stati Uniti d'America 2
ZA - Sudafrica 2
CO - Colombia 1
EC - Ecuador 1
IN - India 1
MA - Marocco 1
PY - Paraguay 1
Totale 17.178
Città #
Genova 10.472
Genoa 4.287
Rapallo 1.211
Vado Ligure 1.114
Bordighera 26
Beijing 10
Ho Chi Minh City 3
Singapore 3
Ashburn 2
Porto Alegre 2
Araruama 1
Aurora 1
Bogotá 1
Buenos Aires 1
Bắc Ninh 1
Cape Town 1
Conselheiro Lafaiete 1
Cotia 1
Cuenca 1
Curitibanos 1
Delhi 1
Faxinal 1
Federación 1
Hanoi 1
Jakarta 1
Jaíba 1
Johannesburg 1
Joinville 1
Pelotas 1
Piracicaba 1
Pirapora 1
Rio Verde 1
Rio de Janeiro 1
Santo Antônio 1
Sapucaia do Sul 1
São Gotardo 1
São José dos Pinhais 1
São João do Piauí 1
São Paulo 1
São Vicente 1
Taubaté 1
Teresina 1
Tétouan 1
Villarrica 1
Vitória da Conquista 1
Totale 17.165
Nome #
Are you (Google) home? Detecting users’ presence through traffic analysis of smart speakers 2.510
Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications 191
Automatic security verification of mobile app configurations 186
Formal modeling and automatic enforcement of Bring Your Own Device policies 183
Efficient Management of Resources and Entities using the HyVonNe P2P Architecture 181
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing 180
A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks 178
Using Screen Brightness to Improve Security in Mobile Social Network Access 177
An Empirical Evaluation of the Android Security Framework 175
Beaconing support in Publish-Subscribe Middleware for Vehicular Applications 172
GridWalker: a visual tool for supporting the advanced discovery of Grid resources 171
Managing Networks of Mobiles Entities using the HyVonNe P2P Architecture 169
Android vs. SEAndroid: An empirical assessment 169
A denial of service attack to umts networks using sim-less devices 165
A Denial of Service Attack to GSM Networks via Attach Procedure 164
A Taxonomy-based Model of Security and Privacy in Online Social Networks 163
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) 161
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT 159
A distributed approach for structured resource discovery on Grid 157
A survey on energy-aware security mechanisms 155
SortGrid: a Grid Framework compliant with Soft Real Time Requirements 154
Attacking (and Defending) the Maritime Radar System 151
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap 149
A Comparative Performance Evaluation of DNS Tunneling Tools 148
Reducing the impact of traffic sanitization on latency sensitive applications 148
Android Permissions Unleashed 148
Developing a NATO BYOD security policy 147
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices 147
Trustworthy Opportunistic Access to the Internet of Services 142
Formal Modeling and Reasoning about the Android Security Framework 141
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices 141
Measuring and estimating power consumption in Android to support energy-based intrusion detection 138
Trusted host-based card emulation 136
SoRTSim: A high-level simulator for the evaluation of QoS models on Grid 135
On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks 135
Social Network Engineering for Secure Web Data and Services 134
Enabling BYOD through secure meta-market 134
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4 133
Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices 133
Covert channels in IoT deployments through data hiding techniques 133
Mobile app security assessment with the maveric dynamic analysis module 132
Phishing attacks on modern android 132
Breaking and fixing the Android Launching Flow 131
IPS-based reduction of network energy consumption 130
Balancing Delays and Energy Consumption in IPS-Enabled Networks 130
Dynamic latency sensitivity recognition: An application to energy saving 128
Cooperative Access Control for the Grid 127
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition 127
On Social Network Engineering for Secure Web Data and Services 126
Bring your own device, securely 126
A bio-inspired approach to attack graphs analysis 126
Performance assessment and analysis of DNS tunneling tools 126
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches 124
On energy-based profiling of malware in Android 124
Security considerations related to the use of mobile devices in the operation of critical infrastructures 124
Generating statistical insights into network behavior using SKETURE 124
Reducing energy consumption in prospective memory support system through hierarchical positioning algorithm 124
RmPerm: A Tool for Android Permissions Removal 124
Towards energy-aware intrusion detection systems on mobile devices 122
Behavioral Anomaly Detection in Forensics Analysis 121
Mobile App Security Analysis with the MAVeriC Static Analysis Module 120
On the Feasibility of Moderating a Peer-To-Peer CDN System: A Proof-of-Concept Implementation 120
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem 119
Riskindroid: Machine Learning-Based risk analysis on Android 118
Automated Security Analysis of IoT Software Updates 117
Modeling the energy consumption of Distributed IDS: a step towards Green Security 116
SoRTSim: A High-Level Simulator for the Evaluation of QoS Models on Grid 116
BYODCert: Toward a cross-organizational BYOD paradigm 116
The energy impact of security mechanisms in modern mobile devices 114
AppIoTTE: An Architecture for the Security Assessment of Mobile-IoT Ecosystems 113
A Fraud-Resilient Blockchain-Based Solution for Invoice Financing 112
Quality of Service on Grid: Architectural and methodological issues 111
On Re-use of randomness in broadcast encryption 110
A cooperative model for resource sharing on grid 110
Low-Resource Footprint, Data-Driven Malware Detection on Android 110
Optimizing Network Energy Consumption through Intrusion Prevention Systems 110
Formal Analysis of a Privacy-Preserving Billing Protocol 109
2GesturePIN: Securing PIN-Based Authentication on Smartwatches 109
Droids in disarray: Detecting frame confusion in hybrid android apps 108
Securing the ``Bring Your Own Device'' Paradigm 107
Anomaly Detection in Computer Networks: A State-of-the-Art Review 106
HPC & Co strike back: Where are distributed paradigms heading toward? 104
Fine-hearing Google Home: why silence will not protect your privacy 103
Securing the “bring your own device” policy 102
Market-based security for mobile devices 101
FLEX: A flexible code authentication framework for delegating mobile app customization 101
Securing PIN-based authentication in smartwatches with just two gestures 101
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices 101
A secure cloud-edges computing architecture for metagenomics analysis 101
Blockchain-based risk mitigation for invoice financing 99
From HPC to security: How to change research focus and survive - A career perspective 98
DIOXIN: runtime security policy enforcement of fog applications 97
FINSTIX: A Cyber-Physical Data Model for Financial Critical Infrastructures 94
Green-Aware Security: Towards a New Research Field 93
Using ETC framework in virtual laboratories for online students 89
null 83
Obfuscapk: An open-source black-box obfuscation tool for Android apps 83
Dispositivi mobili: nuovi problemi di sicurezza 82
Clickpattern: A pattern lock system resilient to smudge and side-channel attacks 80
Towards Policy-Driven Monitoring of Fog Applications 79
Totale 15.283
Categoria #
all - tutte 55.225
article - articoli 20.591
book - libri 0
conference - conferenze 25.722
curatela - curatele 398
other - altro 0
patent - brevetti 0
selected - selezionate 0
volume - volumi 8.514
Totale 110.450


Totale Lug Ago Sett Ott Nov Dic Gen Feb Mar Apr Mag Giu
2020/20213.358 0 0 0 89 51 149 647 913 764 549 97 99
2021/20221.490 25 101 161 147 79 87 128 311 80 146 70 155
2022/20231.510 138 108 26 96 202 272 18 137 308 10 146 49
2023/2024992 59 114 51 131 66 201 64 50 21 30 96 109
2024/20252.785 62 216 83 176 354 303 238 471 110 130 303 339
2025/20261.491 715 84 392 300 0 0 0 0 0 0 0 0
Totale 17.403