Follow
Alessio Merlo
Alessio Merlo
Full Professor of Computer Engineering, School for Advanced Defense Studies (CASD), Rome, Italy
Verified email at ssuos.difesa.it - Homepage
Title
Cited by
Cited by
Year
Obfuscapk: An open-source black-box obfuscation tool for Android apps
S Aonzo, GC Georgiu, L Verderame, A Merlo
SoftwareX 11, 100403, 2020
932020
A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione
Pervasive and Mobile Computing 24, 77-90, 2015
902015
Anomaly detection in computer networks: A state-of-the-art review.
SWAH Baddar, A Merlo, M Migliardi
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (4), 29-64, 2014
872014
Bring your own device, securely
A Armando, G Costa, A Merlo
Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013
802013
Would you mind forking this process? A denial of service attack on Android (and some countermeasures)
A Armando, A Merlo, M Migliardi, L Verderame
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
762012
Phishing attacks on modern android
S Aonzo, A Merlo, G Tavella, Y Fratantonio
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
682018
Deep reinforcement learning for black-box testing of android apps
A Romdhana, A Merlo, M Ceccato, P Tonella
ACM Transactions on Software Engineering and Methodology, 2022
632022
The burden of inappropriate emergency department pediatric visits: why Italy needs an urgent reform
A Vedovetto, N Soriani, E Merlo, D Gregori
Health Services Research 49 (4), 1290-1305, 2014
612014
Securing the" bring your own device" paradigm
A Armando, G Costa, L Verderame, A Merlo
Computer 47 (6), 48-56, 2014
572014
A fraud-resilient blockchain-based solution for invoice financing
M Guerar, A Merlo, M Migliardi, F Palmieri, L Verderame
IEEE Transactions on Engineering Management 67 (4), 1086-1098, 2020
492020
Formal modeling and reasoning about the android security framework
A Armando, G Costa, A Merlo
International Symposium on Trustworthy Global Computing, 64-81, 2012
482012
A taxonomy-based model of security and privacy in online social networks
L Caviglione, M Coccoli, A Merlo
International Journal of Computational Science and Engineering 9 (4), 325-338, 2014
462014
The energy impact of security mechanisms in modern mobile devices
L Caviglione, A Merlo
Network Security 2012 (2), 11-14, 2012
462012
Towards energy-aware intrusion detection systems on mobile devices
M Curti, A Merlo, M Migliardi, S Schiappacasse
2013 International Conference on High Performance Computing & Simulation …, 2013
452013
A denial of service attack to UMTS networks using SIM-less devices
A Merlo, M Migliardi, N Gobbo, F Palmieri, A Castiglione
IEEE Transactions on Dependable and Secure Computing 11 (3), 280-291, 2014
442014
A comparative performance evaluation of DNS tunneling tools
A Merlo, G Papaleo, S Veneziano, M Aiello
Computational Intelligence in Security for Information Systems: 4th …, 2011
432011
On energy-based profiling of malware in android
A Merlo, M Migliardi, P Fontanelli
2014 international conference on high performance computing & simulation …, 2014
402014
Using screen brightness to improve security in mobile social network access
M Guerar, M Migliardi, A Merlo, M Benmohammed, F Palmieri, ...
IEEE Transactions on Dependable and Secure Computing 15 (4), 621-632, 2016
392016
From model-checking to automated testing of security protocols: Bridging the gap
A Armando, G Pellegrino, R Carbone, A Merlo, D Balzarotti
International Conference on Tests and Proofs, 3-18, 2012
392012
Gotta CAPTCHA’Em all: a survey of 20 Years of the human-or-computer Dilemma
M Guerar, L Verderame, M Migliardi, F Palmieri, A Merlo
ACM Computing Surveys (CSUR) 54 (9), 1-33, 2021
382021
The system can't perform the operation now. Try again later.
Articles 1–20