Gianluigi Me
Gianluigi Me
Università degli Studi Sociali Luiss "Guido Carli"
Email verificata su - Home page
Citata da
Citata da
Android anti-forensics through a local paradigm
A Distefano, G Me, F Pace
digital investigation 7, S83-S94, 2010
A quantitative approach to triaging in mobile forensics
F Marturana, G Me, R Berte, S Tacconi
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
An overall assessment of mobile internal acquisition tool
A Distefano, G Me
digital investigation 5, S121-S127, 2008
A two-factor mobile authentication scheme for secure financial transactions
R Di Pietro, G Me, MA Strangio
International Conference on Mobile Business (ICMB'05), 28-34, 2005
A case study on digital forensics in the cloud
F Marturana, G Me, S Tacconi
2012 International Conference on Cyber-Enabled Distributed Computing and …, 2012
Internal forensic acquisition for mobile equipments
G Me, M Rossi
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-7, 2008
A mobile based approach to strong authentication on Web
G Me, D Pirro, R Sarrecchia
2006 International Multi-Conference on Computing in the Global Information …, 2006
Tor marketplaces exploratory data analysis: the drugs case
A Celestini, G Me, M Mignone
Global Security, Safety and Sustainability-The Security Challenges of the …, 2016
Handbook of electronic security and digital forensics
H Jahankhani, G Me, DL Watson, F Leonhardt
World Scientific, 2010
Fast user classifying to establish forensic analysis priorities
A Grillo, A Lentini, G Me, M Ottoni
2009 Fifth International Conference on IT Security Incident Management and …, 2009
Transaction oriented text messaging with Trusted-SMS
A Grillo, A Lentini, G Me, GF Italiano
2008 Annual Computer Security Applications Conference (ACSAC), 485-494, 2008
An overview of some techniques to exploit VoIP over WLAN
G Me, D Verdone
International Conference on Digital Telecommunications (ICDT'06), 67-67, 2006
Searching the Web for illegal content: the anatomy of a semantic search engine
L Laura, G Me
Soft computing 21 (5), 1245-1252, 2017
MIAT-WM5: forensic acquisition for Windows mobile PocketPC
F Dellutri, V Ottaviani, G Me
Proceedings of the workshop on security and high performance computing, as …, 2008
Mobile local macropayments: Security and prototyping
G Me, MA Strangio, A Schuster
IEEE Pervasive Computing 5 (4), 94-100, 2006
Fast smartphones forensic analysis results through mobile internal acquisition tool and forensic farm
R Berte, F Dellutri, A Grillo, A Lentini, G Me, V Ottaviani
International Journal of Electronic Security and Digital Forensics 2 (1), 18-28, 2009
The botnet revenue model
G Bottazzi, G Me
Proceedings of the 7th International Conference on Security of Information …, 2014
EC-PAY: an efficient and secure ECC-based wireless local payment scheme
G Me, MA Strangio
Third International Conference on Information Technology and Applications …, 2005
Payment security in mobile environment
G Me
ACS/IEEE International Conference on Computer Systems and Applications, 2003 …, 2003
Local authentication with bluetooth enabled mobile devices
F Dellutri, G Me, MA Strangio
Joint International Conference on Autonomic and Autonomous Systems and …, 2005
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20