Homepage of Alessio Merlo

Alessio's pic is missing.

Short Bio

  • Born in Savona, Liguria, the 6th of Feb. 1980.
  • Oct. 2003: B.Sc. cum laude in Computer Science at University of Genova.
  • Sept. 2005: M.Sc. cum laude in Computer Science at University of Genova.
  • From Dec. 2006 to Jan. 2010: research grants at IEIIT-CNR, Branch of Genova.
  • Apr. 2010: Ph.D. in Computer Science at University of Genova on HPC and Grid technologies.
  • From Feb. 2010 to Mar. 2011: PostDoc in Computer Security at AI-Lab, DIST, University of Genova.
  • From Apr. 2011 to Aug. 2014: Assistant Professor at E-Campus University and Associate Researcher at AI-Lab, DIBRIS, University of Genova.
  • Apr. 2017: Habilitation as “Associate Professor” both in Computer Engineering (S.C. 09/H1) and in Computer Science (S.C. 01/B1), according to the Italian National Scientific Habilitation Procedure (ASN 2016-2018).

Current positions

  • Assistant Professor at DIBRIS, University of Genova.
  • Founder and C.T.O. at Talos s.r.l.s.

Publications

Google Scholar - Scopus - DBLP - Semantic Scholar

Books

  • A. Merlo, M. Migliardi, S. Al-Haj Baddar (Eds.). “Adaptive Mobile Computing: Advances in Processing of Mobile Data Sets” Elsevier. ISBN: 9780128046036. Expected release: 2017, 2Q.
  • L. Caviglione, M. Coccoli, A. Merlo (Eds.). “Social Network Engineering for Secure Web Data and Services”. DOI: 10.4018/978-1-4666-3926-3, IGI-Global.

International Journals

  • M. Guerar, A. Merlo, M. Migliardi. “Completely Automated Public Physical test to tell Computers and Humans Apart: A Usability Study on Mobile Devices”. Future Generation Computer Systems, Elsevier (to appear). DOI: http://dx.doi.org/10.1016/j.future.2017.03.012.
  • M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, F. Palmieri, A. Castiglione. “Using Screen Brightness to Improve Security in Mobile Social Network Access”, IEEE Trans. on Dependable and Secure Computing. DOI: 10.1109/TDSC.2016.2601603.
  • G. Costa, A. Merlo, L. Verderame, A. Armando. “Automatic Security Verification of Mobile App Configurations”, Future Generation Computer Systems, Elsevier. DOI: 10.1016/j.future.2016.06.014.
  • A. Merlo, M. Migliardi, E. Spadacini. “IPS-Based Reduction of Network Energy Consumption”, Logic Journal of the IGPL, Oxford Press. DOI: 10.1093/jigpal/jzw053.
  • A. Merlo, G. Costa, L. Verderame, A. Armando. “Android vs. SEAndroid: an Empirical Assessment”, Pervasive & Mobile Computing, Vol. 30, pp. 113-131, Elsevier. DOI: 10.1016/j.pmcj.2016.01.006.
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi. “Generating Statistical Insights into Network Behavior Using SKETURE”, Journal of High Speed Networks, Vol. 22, N. 1, pp. 65-76, IoS Press. DOI: 10.3233/JHS-160539.
  • A. Merlo, M. Migliardi, P. Fontanelli. “Measuring and Estimating Power Consumption in Android to Support Energy-based Intrusion Detection”, Journal of Computer Security, 23(5):611-637, IoS Press. DOI: 10.3233/JCS-150530.
  • A. Merlo, M. Migliardi, L. Caviglione. “A Survey on Energy-Aware Security Mechanisms”, Pervasive & Mobile Computing, Vol. 24, pp. 77-90, Dec. 2015, Elsevier. DOI:10.1016/j.pmcj.2015.05.005.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Modeling and Enforcing Bring Your Own Device Policies”, International Journal of Information Security, (2015) 14(2):123-140, Springer, DOI: 10.1007/s10207-014-0252-y.
  • A. Armando, G. Bocci, G. Chiarelli, G. Costa, G. De Maglie, R. Mammoliti, A. Merlo. “Mobile App Security Analysis with the MAVeriC Static Analysis Module”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (2014) 5(4):103-119.
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi. “Anomaly Detection in Computer Networks: A State of-the-Art Review”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, (2014) 5(4):29-64.
  • A. Armando, A. Merlo, L. Verderame. “Security considerations related to the use of mobile devices in the operation of critical infrastructures”, International Journal of Critical Infrastructure Protection, (2015) 7(4):247-256, Elsevier, DOI: 10.1016/j.ijcip.2014.10.002.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Securing the Bring Your Own Device Paradigm”, IEEE Computer, (2014) 47(6):26-34. DOI: 10.1109/MC.2014.164.
  • A. Merlo, M. Migliardi, N. Gobbo, F. Palmieri, A. Castiglione. “A Denial of Service Attack to UMTS Networks Using SIM-less Devices”, IEEE Transactions on Dependable and Secure Computing, (2014) 11(3):280–291, DOI: 10.1109/TDSC.2014.2315198. Featured Article at IEEE CyberSecurity Initiative, 2015.
  • L. Caviglione, M. Coccoli, A. Merlo. “A Taxonomy-based Model of Security and Privacy in Online Social Networks”, International Journal of Computational Science and Engineering, (2014) 49(4):325-338, Inderscience, DOI: 10.1504/IJCSE.2014.060717.
  • A. Armando, A. Merlo, M. Migliardi, L. Verderame. “Breaking and Fixing the Android Launching Flow”, Computer & Security, (2013) 39A:104-115, Elsevier, DOI: 10.1016/j.cose.2013.03.009.
  • M. Migliardi, A. Merlo. “Improving Energy Efficiency in Distributed Intrusion Detection Systems”, Journal of High Speed Networks, (2013) 19(3):251-264, IoS Press, DOI: 10.3233/JHS-130476.
  • A. Merlo. “Secure Cooperative Access Control on Grid”, Future Generation Computer Systems, (2013) 29(2):497–508, Elsevier. DOI: 10.1016/j.future.2012.08.001.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Securing the Bring Your Own Device Policy”, Journal of Internet Services and Information Security (2012), 2(3):3-16. Best Paper Award at MIST 2012.
  • L. Caviglione, A. Merlo, M. Migliardi. “Green-Aware Security: Towards a new Research Field”, Journal of Information Assurance and Security, (2012) 7(7):338-346, Dynamic Publishers Inc., USA.
  • L. Caviglione, A. Merlo. “The Energy Impact of Security Mechanisms in Modern Mobile Devices”, Network Security, 2012(2):11-14, Elsevier. DOI : 10.1016/S1353-4858(12)70015-6.
  • M. Aiello, A. Merlo, G. Papaleo. “Performance Assessment of DNS Tunneling Tools”, Logic Journal of the IGPL, (2012) 21(4):592-602, Oxford Journals. DOI: 10.1093/jigpal/jzs029.
  • A. Merlo. “A Cooperative Model for Resource Sharing on Grid”, Journal of Information Assurance and Security, (2011) 6(1):106-114, Dynamic Publishers Inc., USA.
  • A. Merlo, A. Clematis, A. Corana, V. Gianuzzi. “Quality of Service on Grid: architectural and methodological issues”, * Concurrency and Computation: Practice and Experience*, (2011) 23(8):745-766,Wiley, DOI: 10.1002/cpe.1641.
  • V. Gianuzzi, D. D’Agostino, A. Merlo, A. Clematis. “Efficient management of resources and entities using the HyVonNe P2P architecture”, International Journal of Grid and Utility Computing, (2009) 1(3):216-226, DOI: 10.1504/IJGUC.2009.027649.

Book Chapters

  • L. Caviglione, M. Coccoli, A. Merlo. “A Graph-based Approach to Model Privacy and Security Issues of Online Social Networks”, in Social Network Engineering for Secure Web Data and Services, pp. 184-205, IGI-Global. DOI: 10.4018/978-1-4666-3926-3.ch009.
  • L. Caviglione, M. Coccoli, A. Merlo. “On Social Network Engineering for Secure Web Data and Services”, in Social Network Engineering for Secure Web Data and Services, pp. 1-4, IGI Global. DOI: 10.4018/978-1-4666-3926-3.ch001.
  • L. Caviglione, A. Merlo. “Analysis and Development of Green-Aware Security Mechanisms for Modern Internet Applications”, in Handbook of Green Information and Communication Systems, pp. 589-610, Wiley. DOI: 10.1016/B978-0-12-415844-3.00023-1.
  • A. Merlo, A. Corana, V. Gianuzzi, A. Clematis. “SoRTSim: A high-level simulator for the evaluation of QoS models on Grid”, Remote Instrumentation for eScience and Related Aspects, Springer, pp. 161-176, Springer, ISBN 978-1-4614-0507-8, DOI: 10.1007/978-1-4614-0508-5_11.
  • A. Merlo, D. D’Agostino, V. Gianuzzi, A. Clematis, A. Corana. “GridWalker: a visual tool for supporting the advanced discovery of Grid resources”, in Remote Instrumentation Services in the e-infrastructure, pp. 103-112, Springer, ISBN 978-1-4419-5573-9, DOI: 10.1007/978-1-4419-5574-6_8.
  • A. Merlo, A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Quarati, “SoRTGrid: a Grid framework compliant with Soft Real Time requirements”, in Remote Instrumentation and Virtual Laboratories: Service Architecture and Networking, pp. 145-161, Springer, ISBN 978-1-4419-5595-1, DOI: 10.1007/978-1-4419-5597-5_13.
  • A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo, “Grid services for 3D data analysis in Virtual Laboratories”, in Grid Enabled Remote Instrumentation, pp. 481-498, Springer, ISBN 978-0-387-09662-9, DOI: 10.1007/978-0-387-09663-6_32.

International Conference Proceedings

  • A. Merlo, G. C. Georgiu. “RiskInDroid: Machine Learning-based Risk Analysis on Android”, in Proc. of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2017), Rome, Italy.
  • A. Merlo. “BYODCert: Toward a Cross-Organizational BYOD paradigm”, in Proc. of the 12th International Conference on Green, Pervasive and Cloud Computing (GCP 2017), Cetara, Italy.
  • S. Al Haj Baddar, A. Merlo, M. Migliardi, F. Palmieri. “Dynamic Latency Sensitivity Recognition: an Application to Energy Saving”, in Proc. of the 12th International Conference on Green, Pervasive and Cloud Computing (GCP 2017), Cetara, Italy.
  • A. Merlo, L. Lorrai, L. Verderame. Efficient Trusted Host-based Card Emulation on TEE-enabled Android Devices, in Proc. of the 11th International Conference on High Performance Computing Systems (HPCS 2016), pp. 454-459, Innsbruck, Austria. DOI: 10.1109/HPCSim.2016.7568370.
  • G. Costa, P. Gasti, A. Merlo, S.-H. Yu. “FLEX: A Flexible Code Authentication Framework for Delegating Mobile App Customization”, in Proc. of the 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016), pp. 389-400, Xi’an, China. DOI: 10.1145/2897845.2897887.
  • A. Armando, G. Costa, A. Merlo, L. Verderame, K. Wrona. “Developing the NATO BYOD Security Policy”, in Proc. of the 15th International Conference on Military Communications and Information Systems (ICMCIS 2016), pp. 1-6, Brussels, Belgium. DOI: 10.1109/ICMCIS.2016.7496587.
  • A. Merlo, M. Migliardi, E. Spadacini. “Balancing Delays and Energy Consumption in IPS-Enabled Networks”, in Proc. of the 30th IEEE International Conference on Advanced Information Networking and Applications (AINA 2016), pp. 267-272, Crans-Montana, Switzerland. DOI: 10.1109/WAINA.2016.109.
  • S. Al-Haj Baddar, A. Merlo, M. Migliardi. “SKETURE: A Sketch-based Packet Analysis tool”, in Proc. of the 7th ACM CCS International Workshop on Managing Insider Security Threats ([email protected] 2015), pp. 67–70, Denver, USA. DOI: 10.1145/2808783.2808791.
  • A. Armando, G. Bocci, G. Costa, R. Mammoliti, A. Merlo, S. Ranise, R. Traverso, A. Valenza. “Mobile App Security Assessment with the MAVeriC Dynamic Analysis Module”, in Proc. of the 7th ACM CCS International Workshop on Managing Insider Security Threats ([email protected] 2015), pp. 41–49, Denver, USA. DOI: 10.1145/2808783.2808786.
  • M. Migliardi, A. Merlo, A. Passaglia. “On the Feasibility of Moderating a Peer-to-Peer CDN System: A Proof-of-Concept Implementation”, in Proc. of the 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2015) , Krakow, Poland. DOI: 10.1109/3PGCIC.2015.53.
  • A. Armando, R. Carbone, G. Costa, A. Merlo. “Android Permissions Unleashed”, in Proc. of the 28th IEEE Computer Security Foundations Symposium (CSF 2015), IEEE. DOI: 10.1109/CSF.2015.29.
  • A. Armando, G. Bocci, G. Chiarelli, G. Costa, G. De Maglie, R. Mammoliti, and A. Merlo. “SAM: the Static Analysis Module of the MAVERIC Mobile App Security Verification Platform”, in Proc. of 2015 European Joint Conferences on Theory and Practice of Software (ETAPS 2015), LNCS Vol. 9035, 2015, pp 225-230, Springer, DOI: 10.1007/978-3-662-46681-0_19.
  • A. Armando, A. Merlo, L. Verderame. “Trusted Host-Based Card Emulation”, in Proc. of the 10th International Conference on High Performance Computing Systems (HPCS 2015), IEEE. DOI: 10.1109/HPCSim.2015.7237043.
  • M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, B. Messabih. “A Completely Automatic Public Physical test to tell Computers and Humans Apart: a way to enhance authentication schemes in mobile devices”, in Proc. of the 10th International Conference on High Performance Computing Systems (HPCS 2015), IEEE. DOI: 10.1109/HPCSim.2015.7237041.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Enabling BYOD through Secure Meta-Market”, in Proc. of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014), pp. 219-230, ACM NY, DOI: 10.1145/2627393.2627410.
  • A. Merlo, M. Migliardi, P. Fontanelli. “On Energy-Based Profiling of Malware in Android”, in Proc. of the 9th International Conference on High Performance Computing Systems (HPCS 2014), pp. 535-542, IEEE, DOI: 10.1109/HPCSim.2014.6903732.
  • A. Merlo, M. Migliardi, D. Raso, E. Spadacini. “Optimizing Network Energy Consumption through Intrusion Prevention Systems”, in Proc. of the 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2014), AISC, Vol. 299, 2014, pp. 505-515, Springer, DOI: 10.1007/978-3-319-07995-0_50.
  • M. Migliardi, A. Merlo, L. Caviglione. “A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing”, in Proc. of the 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014), pp. 241-246, IEEE, DOI: 10.1109/IMIS.2014.30.
  • M. Migliardi, A. Merlo, M. Tettamanti. “Reducing Energy Consumption in Prospective Memory Support System through Hierarchical Positioning Algorithm”, in Proc. of 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2014), pp. 575-580, IEEE, DOI: e10.1109/INCoS.2014.47.
  • M. Migliardi, A. Merlo. “Energy Consumption Simulation of Different Distributed Intrusion Detection Approaches”, in Proc. of 27th IEEE International Conference on Advanced Information Networking and Applications (AINA 2013), pp. 1547-1552, IEEE, DOI: 10.1109/WAINA.2013.214. Best Paper Award.
  • A. Armando, G. Costa, A. Merlo, L. Verderame. “Bring Your Own Device, Securely”, in Proc. of the 28th ACM Symposium on Applied Computing (SAC 2013), Vol. 2, pp. 1852-1858, ACM, DOI: 10.1145/2480362.2480707.
  • A. Armando, A. Merlo, L. Verderame. “An Empirical Evaluation of the Android Security Framework”, in Proc. of the 28th International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2013), LNCS, Vol. 405, pp. 176-189, Springer, DOI: 10.1007/978-3-642-39218-4_14.
  • N. Gobbo, A. Merlo, M. Migliardi. “A Denial of Service attack to GSM networks via attach procedure, in *Proc. of the 8th International Conference on Availability, Reliability and Security (ARES 2013), LNCS, Vol. 8128, pp. 361-376, Springer, DOI: 10.1007/978-3-642-40588-4_25.
  • M. Curti, A. Merlo, M. Migliardi, S. Schiappacasse. “Towards Energy-Aware Intrusion Detection Systems on Mobile Devices”, in Proc. of the 8th International Conference on High Performance Computing Systems (HPCS 2013), pp. 289-296, IEEE, DOI: 10.1109/HPCSim.2013.6641428.
  • A. Armando, A. Castiglione, G. Costa, U. Fiore, A. Merlo, L. Verderame, I. You. “Trustworthy Opportunistic Access to the Internet of Services”, in Proc. of the 1st Information and Communication Technology Eurasia Conference (EurAsia 2013), LNCS, Vol. 7804, 2013, pp. 469-478, Springer, DOI: 10.1007/978-3-642-36818-9_52.
  • A. Armando, A. Merlo, A. Migliardi, L. Verderame. “Would you mind forking this process? A Denial-of-Service attack on Android (and some countermeasures)”, in Proc. of the 27th International Conference on ICT Systems Security and Privacy Protection (IFIP-SEC 2012), LNCS IFIP AICT n.376, pp. 13-24, Springer, DOI: 10.1007/978-3-642-30436-1_2. Best Paper Award.
  • A. Armando, G. Costa, A. Merlo. “Formal Modeling and Reasoning about the Android Security Framework”, in Proc. of the 7th International Symposium on Trustworthy Global Computing (TGC 2012), LNCS Vol. 8191, 2013, pp 64-81, Springer. DOI: 10.1007/978-3-642-41157-1_5.
  • A. Armando, G. Pellegrino, R. Carbone, A. Merlo, D. Balzarotti. “From Model-checking to Automated Testing of Security Protocols: Bridging the Gap”, in Proc. of the 6th International Conference on Tests & Proofs (TAP 2012), LNCS Vol. 7305, 2012, pp 3-18, Springer, DOI: 10.1007/978-3-642-30473-6_3.
  • A. Armando, R. Carbone, A. Merlo. “Formal Analysis of a Privacy-Preserving Billing Protocol”, in Proc. of the 1st Workshop on Smart Grid Security (SGSec 2012), LNCS 7823, 2013, pp. 108-119, Springer, DOI: 10.1007/978-3-642-38030-3_8.
  • P. Maresca, A. Merlo, M. Arrigoni Neri, L. Stanganelli. “Using ETC framework in virtual laboratories for online students” in Proc. of the 7th Workshop of the Italian Eclipse Community (ECL-IT 2012).
  • L. Caviglione, A. Merlo, M. Migliardi. “What is Green Security?”, in Proc. of the 7th International Conference on Information Assurance and Security (IAS 2011), Malacca (Malaysia), pp. 366-371, IEEE. DOI: 10.1109/ISIAS.2011.6122781.
  • P. Gasti, A. Merlo. “On Re-Use of Randomness in Broadcast Encryption”, in Proc. of the 9th IEEE International Conference on Privacy, Security and Trust (PST 2011), Canada, pp. 36-43, IEEE, DOI: 10.1109/PST.2011.5971961.
  • A. Merlo, G. Papaleo, S. Veneziano, M. Aiello, “A Comparative Performance Evaluation of DNS Tunneling Tools”, in Proc. of the 4th International Conference on Computational intelligence in Security for Information Systems (CISIS 2011), LNCS Vol. 6694, 2011, pp. 84-91, Springer, DOI: 10.1007/978-3-642-21323-6_11.
  • M. Migliardi, A. Merlo. “Modeling the energy consumption of a distributed IDS: a step towards Green Security”, in Proc. of the 34th IEEE International Convention on Information and Communication Technology (MiPro 2011), Electronics and Microelectronics, pp. 1452 - 1457, IEEE.
  • P. Gasti, A. Merlo, G. Ciaccio, G. Chiola. “On the Integrity of Network Coding-based Anonymous P2P File Sharing Networks”, in Proc. of the 9th IEEE International Symposium on Network Computing and Applications (NCA 2010), pp.192-197, IEEE, DOI: 10.1109/NCA.2010.34.
  • A. Merlo, A. Armando. “Cooperative Access Control for the Grid” (IAS 2010), in Proc. of the 6th International Conference on Information Assurance and Security, pp. 228-233, IEEE, DOI: 10.1109/ISIAS.2010.5604068.
  • V. Gianuzzi, A. Merlo. “Beaconing support in Publish-Subscribe Middleware for Vehicular Applications”, in Proc. of the 2nd International Workshop on Pervasive Mobile and Embedded Computing (M-MPAC 2010), pp. 1-8, ACM, DOI: 10.1145/1890791.1890795.
  • V. Gianuzzi, A. Merlo, A. Clematis, D. D’Agostino. “Managing Networks of Mobile Entities using the HyVonNe P2P Architecture”, in Proc. of the 2nd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008), pp. 335-341, IEEE, DOI: 10.1109/CISIS.2008.62.
  • A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo, A. Quarati. “A Distributed Approach for Structured Resource Discovery on Grid”, in Proc. of the 2nd International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2008), pp. 117-125. IEEE, DOI: 10.1109/CISIS.2008.112.
  • A. Clematis, A. Corana, D. D’Agostino, V. Gianuzzi, A. Merlo. “Resource selection and application execution in a Grid: A migration experience from GT2 to GT4”, in Proc. of the International Conference on Grid computing, high-performAnce and Distributed Applications (GADA 2006), LNCS, n. 4276, pp. 1132-1142, Springer, DOI: 10.1007/11914952_4.

Services to the Profession

Editorial Activity

International Conference Chair

General Chair

  • 15th International Conference on High Performance Computing & Simulation (HPCS 2017), July 17-21, 2017, Genoa.

Local Chair

  • 15th International Conference of the Italian Association for Artificial Intelligence (AIxIA 2016), Nov. 21-25, 2016.

Workshop Chair

  • 7th International Workshop on Security and Performance in Cloud Computing (SPCloud 2017, July 17- 21, 2017, Genoa, Italy.
  • 13th International Workshop on Security and High Performance Computing (SHPCS 2017), July 17-21, 2017, Genoa, Italy.
  • 6th International Workshop on Security and Performance in Cloud Computing (SPCloud 2016), July 18- 22, 2016, Innsbruck, Austria.
  • 12th International Workshop on Security and High Performance Computing (SHPCS 2016), July 18-22, 2016, Innsbruck, Austria.
  • 5th International Workshop on Security and Performance in Cloud Computing (SPCloud 2015), July 20- 24, 2015, Amsterdam, the Netherlands.
  • 11th International Workshop on Security and High Performance Computing (SHPCS 2015), July 20-24, 2015, Amsterdam, the Netherlands.
  • 4th International Workshop on Security and Performance in Cloud Computing (SPCloud 2014), July, 21- 25, 2014, Bologna, Italy.

Track Chair

  • Track: Demos. 1st Italian Conference on Cyber Security (ITA-SEC 2017).
  • Track: Smart Spaces and Intelligent Environments, 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2015).
  • Track: Security, Trust and Privacy, 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014).
  • Track Mobile Collaborative Systems, 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2014), Sep. 10-12, 2014, Salerno, Italy.

Session Chair

  • Session: SHPCS I, 31st International Conference on High Performance Computing & Simulation (HPCS 2016), July 18-22, 2016, Innsbruck, Austria.
  • Session: SHPCS II, 31st International Conference on High Performance Computing & Simulation (HPCS 2016), July 18-22, 2016, Innsbruck, Austria.
  • Session: Tutorial V, 31st International Conference on High Performance Computing & Simulation (HPCS 2016), July 18-22, 2016, Innsbruck, Austria.
  • Session: Mobile Security II, 11th ACM Asia Conference on Computer and Communications Security (AsiaCCS 2016), May 30 - June 3, 2016, Xi’an, China. Session: SHPCS I, 30th International Conference on High Performance Computing & Simulation (HPCS 2015), July 20-24, 2015, Amsterdam, the Netherlands.
  • Session: SHPCS II, 29th International Conference on High Performance Computing & Simulation (HPCS 2014), July, 21-25, Bologna, Italy.
  • Session Infrastructure and Network Security II, 7th International Conference on Computational Intelligence in Security for Information Systems (CISIS (Sec) 2014), June 25-27, 2014, Bilbao, Spain.
  • Session: Parallel Computing, 8th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS 2014), July 2-4, 2014, Birmingham, UK.
  • Session High Performance Mobile Systems, Location-Based Services, and Applications in Ubiquitous Computing, 29th International Conference on High Performance Computing & Simulation (HPCS 2013), July 1-5, 2013, Helsinki, Finland.
  • Session: Job Scheduling and Environment Sensing, 27th IEEE International Conference on Advanced Information Networking and Applications (AINA 2013), Mar. 25-28, 2013, Barcelona, Spain.

TCP Membership

  • 3rd International Conference on Mobile, Secure and Programmable Networking (MSPN 2017), June 29-30, 2017, Paris, France.
  • 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017), Sep. 18-20, 2017, Lund, Sweden.
  • 31st IEEE International Conference on Advanced Information Networking and Applications (AINA 2017), Mar. 27-29, Taipei, Taiwan.
  • 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), May 11-14, Cetara, Italy.
  • 32nd International Conference on High Performance Computing & Simulation (HPCS 2017), July 17-21, 2017, Genoa, Italy.
  • 7th International Workshop on Security and Performance in Cloud Computing (SPCloud 2017), July 17-21, 2017, Genoa, Italy.
  • 13th International Workshop on Security and High Performance Computing (SHPCS 2017), July 17-21, 2017, Genoa, Italy.
  • 32nd ACM SIGAPP Symposium On Applied Computing (SAC 2017), Apr. 3-7, 2017, Marrakech, Morocco.
  • 8th ACM CCS International Workshop on Managing Insider Security Threats ([email protected] 2016), In Conjunction with ACM CCS 2016, Oct. 24-28, 2016, Vienna, Austria.
  • 10th International Conference on Information Security Theory and Practice (WISTP 2016), Sep. 26-27, 2016, Heraklion, Crete, Greece.
  • 2016 International Symposium on Mobile Internet Security (MobiSec 2016), Jul. 14-15, 2016, Taichung, Taiwan.
  • 2nd International Conference on Mobile, Secure and Programmable Networking (MSPN 2016), June 1-3, 2016, Paris, France.
  • 3rd International Workshop on Energy-Aware Systems, Communications and Security (EASyCoSe 2016), March 23-25, 2016, Crans-Montana, Switzerland.
  • 31st International Conference on High Performance Computing & Simulation (HPCS 2016), July 18-22, 2016, Innsbruck, Austria.
  • 6th International Workshop on Security and Performance in Cloud Computing (SPCloud 2016), July 18-22, 2016, Innsbruck, Austria.
  • 12th International Workshop on Security and High Performance Computing (SHPCS 2016), July 18-22, 2016, Innsbruck, Austria.
  • 9th International Conference on Information Security Theory and Practice (WISTP 2015), Aug. 24-25, 2015, Heraklion, Crete, Greece.
  • 30th International Conference on High Performance Computing & Simulation (HPCS 2015), July 20-24, 2015, Amsterdam, the Netherlands.
  • 1st International Conference on Mobile, Secure and Programmable Networking (MSPN 2015), June 15-17, 2015, Paris, France.
  • 5th Int. Workshop on Security, Privacy and Performance in Cloud Computing (SPCloud 2015), July 20-24, 2015, Amsterdam, the Netherlands.
  • 10th International Workshop on Security and High Performance Computing Systems (SHPCS 2015), July 20-24, 2015, Amsterdam, the Netherlands.
  • 7th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2015), Sep. 2-4, 2015, Taipei, Taiwan.
  • 4th International Workshop on Security, Privacy and Performance in Cloud Computing (SPCloud 2014), July, 21-25, Bologna, Italy.
  • 29th International Conference on High Performance Computing & Simulation (HPCS 2014), July, 21-25, Bologna, Italy.
  • 17th International Conference on Network-based Information Systems (NBiS 2014), Sept. 10-12, 2014, Salerno, Italy.
  • 6th International Conference on Intelligent Networking and Collaborative Systems (INCoS 2014), Sept. 10-12, 2014, Salerno, Italy.
  • 2nd International Workshop on Energy-Aware Systems, Communications and Security (EASyCoSe 2014), Sept. 10-12, 2014, Salerno, Italy.
  • 8th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2014), July 2-4, 2014, Birmingham, UK.
  • 8th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2014), July 2-4, 2014, Birmingham, UK.
  • 9th International Workshop on Security and High Performance Computing Systems (SHPCS 2014), July 25-29, 2014, Bologna, Italy.
  • 10th IEEE International Conference on Information Assurance and Security (IAS 2014), Nov. 27-29, 2014, Okinawa, Japan.
  • 16th International Conference on Network-based Information Systems (NBiS 2013), Sept. 4-6, 2013, Gwangju, China.
  • 28th IFIP International Information Security and Privacy Conference (IFIP-SEC 2013), July 8-10, 2013, Auckland, New Zealand.
  • 9th IEEE International Conference on Information Assurance and Security (IAS 2013), Dec. 4-6, 2013, Yassmine Hammamet, Tunisia.
  • 8th International Workshop on Security and High Performance Computing Systems (SHPCS 2013), July 1-5, 2013, Helsinki, Finland.
  • 1st International Workshop on Energy-Aware Systems, Communications and Security (EASyCoSe 2013), Mar. 25-28, 2013, Barcelona, Spain.
  • 8th IEEE International Conference on Information Assurance and Security (IAS 2012), Nov. 21-23, 2012, Sao Carlos, Brazil.
  • 7th International Workshop on Security and High Performance Computing Systems (SHPCS 2012), July 2-6, 2012, Madrid, Spain.
  • 7th IEEE International Conference on Information Assurance and Security (IAS 2011), Dec. 5-8, 2011, Malacca, Malaysia.

Projects and Grants

  • BYODCert Project, funded by the University of Genoa. Total funding: € 16.000. Principal Investigator.
  • EduOpen Project, funded by the Italian Ministry of Education, University and Research (MIUR). Faculty participant.
  • Smart Intelligent and Eco-friendly Mobility Project, funded by the Italian Ministry of Education, University and Research (MIUR). Total funding: € 7.782.800. Faculty participant.
  • PLUG-IN Project, funded by the Italian Ministry of Education, University and Research (MIUR). Total funding: € 3.408.950. Faculty participant.
  • Security Horizons (PRIN Project no. 2010XSEMLC), funded by the Italian Ministry of Education, University and Research (MIUR). Total funding: € 572.157. Faculty participant.
  • Security and Cloud Computing Project, POR Liguria, funded by Liguria Region. Total funding: € 150.000. Faculty participant.
  • SPaCIoS Project, Project no. 257876, FP7-ICT-2009-5, ICT-2009.1.4: Trustworthy ICT, funded by EC. Total funding: €3.610.000. Faculty participant.
  • SINTESIS Project, funded by the Italian Ministry of Education, University and Research (MIUR). Total funding: € 3.600.00. Faculty participant.

Teaching Activity

(2014- ) Assistant Professor, DIBRIS, University of Genoa.

Degree Course Taught ECTS From: (a.y.) To: (a.y.) Tot. yrs.
M.Sc. Computer Science Data Privacy 6 2016/17 now 1
B. Eng. Computer Engineering Android Programming 6 2014/15 now 3
Ph.D. Computer Science Mobile Security 3 2014/15 now 3
Postgrad. Diploma in Cyber Security Web Security 3 2014/15 now 3
Undergrad. Diploma in ICT (ITS-ICT) MySQL Programming 6 2014/15 now 3
Undergrad. Diploma in ICT (ITS-ICT) Web Programming 6 2014/15 2014/15 1
Tirocinio Formativo Assistito Found. of Comp. Science 6 2014/15 2014/15 1
Percorsi Abilitativi Speciali Found. of Comp. Science 6 2014/15 2014/15 1

(2014- ) Lecturer, Telecommunication School for Italian Armed Forces, Chiavari, Italy.

Degree Course Taught ECTS From: (a.y.) To: (a.y.) Tot. yrs.
Vocat. Training in ICT Systems ASP.NET Programming 6 2016/17 now 1
Vocat. Training in ICT Systems Java Programming 6 2016/17 now 1
Vocat. Training in ICT Systems Basics of Programming 6 2014/15 now 3
Vocat. Training in ICT Systems C/C++ Programming 6 2014/15 now 3
Vocat. Training in ICT Systems Java Programming 6 2011/12 2014/15 4
Postgrad. Diploma in ICT Systems Computer Security 6 2013/14 2013/14 1
Postgrad. Diploma in ICT Systems Java Programming 6 2013/14 2013/14 1
Postgrad. Diploma in ICT Systems Databases 6 2013/14 2013/14 1
Postgrad. Diploma in ICT Systems Information Systems 6 2013/14 2013/14 1

Ph.D. Supervision

  • 2017-2019: Doctoral Supervisor of Simone Aonzo (Cycle XXXII), DIBRIS, University of Genoa.
  • 2013-2016: Doctoral Supervisor of Luca Verderame (Cycle XXVIII), DIBRIS, University of Genoa.

Contacts