Alessio Merlo
Orcid: 0000-0002-2272-2376
According to our database1,
Alessio Merlo
authored at least 135 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
A data anonymization methodology for security operations centers: Balancing data protection and security in industrial systems.
Inf. Sci., 2025
2024
On a Collision Course: Unveiling Wireless Attacks to the Aircraft Traffic Collision Avoidance System (TCAS).
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Analyzing the Impact of Obfuscation on the Runtime Execution of Android Apps at Kernel Level.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
SEBASTiAn: A static and extensible black-box application security testing tool for iOS and Android applications.
SoftwareX, July, 2023
IEEE Trans. Intell. Transp. Syst., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Light up that Droid! On the Effectiveness of Static Analysis Features against App Obfuscation for Android Malware Detection.
CoRR, 2023
Assessing the security of inter-app communications in android through reinforcement learning.
Comput. Secur., 2023
Proceedings of the 15th International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2023), 2023
Proceedings of the 2023 International Conference on Research in Adaptive and Convergent Systems, 2023
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
A Preliminary Study of Privilege Life Cycle in Software Management Platform Automation Workflows.
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
2022
ACM Trans. Softw. Eng. Methodol., 2022
ACM Comput. Surv., 2022
Proceedings of the 2022 ACM Workshop on Software Supply Chain Offensive Research and Ecosystem Defenses, 2022
Proceedings of the Quality of Information and Communications Technology, 2022
Proceedings of the 15th IEEE Conference on Software Testing, Verification and Validation, 2022
A Precision Cybersecurity Workflow for Cyber-physical Systems: The IoT Healthcare Use Case.
Proceedings of the Computer Security. ESORICS 2022 International Workshops, 2022
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
ARMAND: Anti-Repackaging through Multi-pattern Anti-tampering based on Native Detection.
Pervasive Mob. Comput., 2021
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021
J. Internet Serv. Inf. Secur., 2021
Int. J. Grid Util. Comput., 2021
CoRR, 2021
Comput. Secur., 2021
Keynote: ARES: A Deep Reinforcement Learning Tool for Black-Box Testing of Android Apps.
Proceedings of the 19th IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2021
Proceedings of the 14th IEEE Conference on Software Testing, Verification and Validation, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Trans. Sustain. Comput., 2020
IEEE Trans. Engineering Management, 2020
CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices.
ACM Trans. Cyber Phys. Syst., 2020
SoftwareX, 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
Concurr. Comput. Pract. Exp., 2020
Proceedings of the Testing Software and Systems, 2020
Proceedings of the Testing Software and Systems, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers.
Proceedings of the Fourth Italian Conference on Cyber Security, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 28th IEEE International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2019
Proceedings of the 23rd International Database Applications & Engineering Symposium, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Concurr. Comput. Pract. Exp., 2018
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT.
Comput. Secur., 2018
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition.
Comput. Secur., 2018
Proceedings of the 12th International Conference on Ubiquitous Computing and Ambient Intelligence, 2018
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
From HPC to Security: How to Change Research Focus and Survive - A Career Perspective.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017
2016
J. High Speed Networks, 2016
Proceedings of the International Conference on High Performance Computing & Simulation, 2016
Proceedings of the International Conference on Military Communications and Information Systems, 2016
FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
Measuring and estimating power consumption in Android to support energy-based intrusion detection.
J. Comput. Secur., 2015
Int. J. Inf. Sec., 2015
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2015
A Completely Automatic Public Physical test to tell Computers and Humans Apart: A way to enhance authentication schemes in mobile devices.
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
Proceedings of the 2015 International Conference on High Performance Computing & Simulation, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation.
Proceedings of the 10th International Conference on P2P, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Int. J. Comput. Sci. Eng., 2014
Security considerations related to the use of mobile devices in the operation of critical infrastructures.
Int. J. Crit. Infrastructure Prot., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the International Joint Conference SOCO'14-CISIS'14-ICEUTE'14, 2014
Reducing Energy Consumption in Prospective Memory Support System through Hierarchical Positioning Algorithm.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the International Conference on High Performance Computing & Simulation, 2014
2013
J. High Speed Networks, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Proceedings of the International Conference on High Performance Computing & Simulation, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Netw. Secur., 2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Proceedings of the Tests and Proofs - 6th International Conference, 2012
Proceedings of the Smart Grid Security - First International Workshop, 2012
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures).
Proceedings of the Information Security and Privacy Research, 2012
2011
Concurr. Comput. Pract. Exp., 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the MIPRO, 2011
Proceedings of the Computational Intelligence in Security for Information Systems, 2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Int. J. Grid Util. Comput., 2009
2008
Proceedings of the Second International Conference on Complex, 2008
Proceedings of the Second International Conference on Complex, 2008
2006
Resource Selection and Application Execution in a Grid: A Migration Experience from GT2 to GT4.
Proceedings of the On the Move to Meaningful Internet Systems 2006: CoopIS, 2006