Alessio Merlo
Alessio Merlo
Associate Professor of Computer Engineering, University of Genoa
Verified email at unige.it - Homepage
Title
Cited by
Cited by
Year
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 1852-1858, 2013
662013
A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione
Pervasive and Mobile Computing 24, 77-90, 2015
652015
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
IFIP International Information Security Conference, 13-24, 2012
632012
Anomaly Detection in Computer Networks: A State-of-the-Art Review.
SWAH Baddar, A Merlo, M Migliardi
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (4), 29-64, 2014
462014
Securing the" bring your own device" paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
462014
The burden of inappropriate emergency department pediatric visits: why Italy needs an urgent reform
A Vedovetto, N Soriani, E Merlo, D Gregori
Health services research 49 (4), 1290-1305, 2014
422014
Formal modeling and reasoning about the android security framework
A Armando, G Costa, A Merlo
International Symposium on Trustworthy Global Computing, 64-81, 2012
412012
A taxonomy-based model of security and privacy in online social networks
L Caviglione, M Coccoli, A Merlo
International Journal of Computational Science and Engineering 9 (4), 325-338, 2014
392014
A denial of service attack to UMTS networks using SIM-less devices
A Merlo, M Migliardi, N Gobbo, F Palmieri, A Castiglione
IEEE Transactions on Dependable and Secure Computing 11 (3), 280-291, 2014
382014
The energy impact of security mechanisms in modern mobile devices
L Caviglione, A Merlo
Network Security 2012 (2), 11-14, 2012
382012
Breaking and fixing the android launching flow
A Armando, A Merlo, M Migliardi, L Verderame
Computers & Security 39, 104-115, 2013
342013
Towards energy-aware intrusion detection systems on mobile devices
M Curti, A Merlo, M Migliardi, S Schiappacasse
2013 International Conference on High Performance Computing & Simulationá…, 2013
342013
From model-checking to automated testing of security protocols: Bridging the gap
A Armando, G Pellegrino, R Carbone, A Merlo, D Balzarotti
International Conference on Tests and Proofs, 3-18, 2012
332012
A comparative performance evaluation of DNS tunneling tools
A Merlo, G Papaleo, S Veneziano, M Aiello
Computational Intelligence in Security for Information Systems, 84-91, 2011
312011
Phishing attacks on modern android
S Aonzo, A Merlo, G Tavella, Y Fratantonio
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
292018
On energy-based profiling of malware in android
A Merlo, M Migliardi, P Fontanelli
2014 international conference on high performance computing & simulationá…, 2014
282014
What is green security?
L Caviglione, A Merlo, M Migliardi
2011 7th international conference on information assurance and security (IASá…, 2011
272011
Enabling BYOD through secure meta-market
A Armando, G Costa, A Merlo, L Verderame
Proceedings of the 2014 ACM conference on Security and privacy in wirelessá…, 2014
262014
Formal modeling and automatic enforcement of Bring Your Own Device policies
A Armando, G Costa, A Merlo, L Verderame
International Journal of Information Security 14 (2), 123-140, 2015
242015
Measuring and estimating power consumption in android to support energy-based intrusion detection
A Merlo, M Migliardi, P Fontanelli
Journal of Computer Security 23 (5), 611-637, 2015
222015
The system can't perform the operation now. Try again later.
Articles 1–20