Name
Affiliation
Papers
MATTEO DELL'AMICO
Università di Genova, Italy
41
Collaborators
Citations 
PageRank 
77
177
18.46
Referers 
Referees 
References 
517
1221
563
Search Limit
1001000
Title
Citations
PageRank
Year
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships00.342022
The Tangled Genealogy of IoT Malware.30.392020
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.10.352019
Can I Opt Out Yet? - GDPR and the Global Illusion of Cookie Control.50.422019
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis.10.362018
Scalable and flexible clustering solutions for mobile phone-based population indicators.10.352017
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators.00.342017
RiskTeller: Predicting the Risk of Cyber Incidents.70.462017
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data.40.452017
NG-DBSCAN: Scalable Density-Based Clustering for Arbitrary Data.00.342017
Improving Population Estimation From Mobile Calls: A Clustering Approach30.392016
NG-DBSCAN: Scalable Density-Based Clustering for Arbitrary Data.130.522016
Efficient and Self-Balanced ROLLUP Aggregates for Large-Scale Data Summarization10.372015
Scalable K-Nn Based Text Clustering80.512015
Adaptive redundancy management for durable P2P backup20.412015
On Fair Size-Based Scheduling00.342015
Monte Carlo Strength Evaluation: Fast and Reliable Password Checking150.702015
OS-Assisted Task Preemption for Hadoop30.412014
PSBS: Practical Size-Based Scheduling.30.392014
On User Availability Prediction and Network Applications30.382014
On the design space of MapReduce ROLLUP aggregates.10.362014
Trend makers and trend spotters in a mobile application10.372013
A Simulator for Data-Intensive Job Scheduling.30.472013
HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems80.632013
Reference Monitors for Security and Interoperability in OAuth 2.010.372013
Spotting trends: the wisdom of the few20.392012
Redundancy management for P2P backup50.442012
HiPoLDS: a security policy language for distributed systems20.382012
An Empirical Study Of Availability In Friend-To-Friend Storage Systems240.852011
Data Transfer Scheduling For P2p Storage100.632011
Dependable filtering: Philosophy and realizations10.362010
Take a deep breath: a stealthy, resilient and cost-effective botnet using skype130.632010
On Scheduling and Redundancy for P2P Backup30.452010
Back To The Future: On Predicting User Uptime30.452010
Measuring Password Strength: An Empirical Analysis30.692009
Workshop 18 introduction: Fifth International Workshop on Hot Topics in Peer-to-Peer Systems - HOTP2P00.342008
SOFIA: Social Filtering for Robust Recommendations.130.732008
Mapping Small Worlds60.542007
Neighbourhood maps: decentralized ranking in small-world P2P networks50.522006
DO-Casl: an observer-based casl extension for dynamic specifications00.342006
Injecting Distribution in CASL00.342005