Obfuscapk: An open-source black-box obfuscation tool for Android apps S Aonzo, GC Georgiu, L Verderame, A Merlo SoftwareX 11, 100403, 2020 | 86 | 2020 |
A survey on energy-aware security mechanisms A Merlo, M Migliardi, L Caviglione Pervasive and Mobile Computing 24, 77-90, 2015 | 84 | 2015 |
Anomaly detection in computer networks: A state-of-the-art review. SWAH Baddar, A Merlo, M Migliardi J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5 (4), 29-64, 2014 | 81 | 2014 |
Bring your own device, securely A Armando, G Costa, A Merlo Proceedings of the 28th annual acm symposium on applied computing, 1852-1858, 2013 | 78 | 2013 |
Would you mind forking this process? A denial of service attack on Android (and some countermeasures) A Armando, A Merlo, M Migliardi, L Verderame Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012 | 76 | 2012 |
Phishing attacks on modern android S Aonzo, A Merlo, G Tavella, Y Fratantonio Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 62 | 2018 |
The burden of inappropriate emergency department pediatric visits: why Italy needs an urgent reform A Vedovetto, N Soriani, E Merlo, D Gregori Health Services Research 49 (4), 1290-1305, 2014 | 60 | 2014 |
Securing the" bring your own device" paradigm A Armando, G Costa, L Verderame, A Merlo Computer 47 (6), 48-56, 2014 | 55 | 2014 |
Deep reinforcement learning for black-box testing of android apps A Romdhana, A Merlo, M Ceccato, P Tonella ACM Transactions on Software Engineering and Methodology, 2022 | 52 | 2022 |
Formal modeling and reasoning about the android security framework A Armando, G Costa, A Merlo International Symposium on Trustworthy Global Computing, 64-81, 2012 | 48 | 2012 |
A taxonomy-based model of security and privacy in online social networks L Caviglione, M Coccoli, A Merlo International Journal of Computational Science and Engineering 9 (4), 325-338, 2014 | 45 | 2014 |
A denial of service attack to UMTS networks using SIM-less devices A Merlo, M Migliardi, N Gobbo, F Palmieri, A Castiglione IEEE Transactions on Dependable and Secure Computing 11 (3), 280-291, 2014 | 44 | 2014 |
Towards energy-aware intrusion detection systems on mobile devices M Curti, A Merlo, M Migliardi, S Schiappacasse 2013 International Conference on High Performance Computing & Simulation …, 2013 | 44 | 2013 |
The energy impact of security mechanisms in modern mobile devices L Caviglione, A Merlo Network Security 2012 (2), 11-14, 2012 | 44 | 2012 |
A comparative performance evaluation of DNS tunneling tools A Merlo, G Papaleo, S Veneziano, M Aiello Computational Intelligence in Security for Information Systems: 4th …, 2011 | 42 | 2011 |
A fraud-resilient blockchain-based solution for invoice financing M Guerar, A Merlo, M Migliardi, F Palmieri, L Verderame IEEE Transactions on Engineering Management 67 (4), 1086-1098, 2020 | 41 | 2020 |
Using screen brightness to improve security in mobile social network access M Guerar, M Migliardi, A Merlo, M Benmohammed, F Palmieri, ... IEEE Transactions on Dependable and Secure Computing 15 (4), 621-632, 2016 | 38 | 2016 |
From model-checking to automated testing of security protocols: Bridging the gap A Armando, G Pellegrino, R Carbone, A Merlo, D Balzarotti International Conference on Tests and Proofs, 3-18, 2012 | 38 | 2012 |
On energy-based profiling of malware in android A Merlo, M Migliardi, P Fontanelli 2014 international conference on high performance computing & simulation …, 2014 | 37 | 2014 |
What is green security? L Caviglione, A Merlo, M Migliardi 2011 7th international conference on information assurance and security (IAS …, 2011 | 37 | 2011 |