G. Me, M.F. Mucci “Countering Daesh Cognitive and Cyber Warfare with OSINT and Basic Data Mining Tools”, Proceedings of TheInternational Conference on Cybersecurity and Cybercrime (IC3), 2023.
G. Me, L. Pesticcio, P. Spagnoletti, “Discovering hidden relations between Tor Marketplaces users”, in Proceedings of the 15th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2017), Orlando (FL), U.S., 2017.
P. Spagnoletti, G. Me, F. Ceci and A. Prencipe, “Securing national e-ID infrastructures: Tor networks as a source of threats”, in Proceedings of the XIV Conference of the Italian Chapter of AIS (ITAIS), Milano, UK, 2017.
A. Celestini, G. Me et al., “Tor marketplaces exploratory data analysis: the drugs case”, in Proceedings of the 11th International Conference on Global Security, Safety & Sustainability (ICGS3-2017), London, UK, 2017.
G. Bottazzi, G. Me, “Cybercrime-funded terrorism and the threats posed by future technologies:Applealing Economics and targets”, the NATO Advanced Research Workshop on "Terrorists use of Internet", Dublin, 2016.
G. Bottazzi, G. Me, “A Survey on Financial Botnets Threat”, in Proceedings of the 10th International Conference on Global Security, Safety & Sustainability (ICGS3-2015), London, UK, 2015.
L. Laura, G. Me, “Searching the web for illegal content: the anatomy of a semantic search engine”, in Proceedings of the 10th International Conference on Global Security, Safety & Sustainability (ICGS3-2015), London, UK, 2015.
G. Me, Migration to governmental cloud digital forensics community: economics and methodology, Proc. of GECON 2014, The 11th International Conference on Economics of Grids, Clouds, Systems, and Services, ISBN 978-3-319-14609-6, 2014;
L.Laura, G. Me, B. D’Alessio, A. Capone, M. Mignone, “Vertical semantic discovery: the SICH approach on NPS”, Proc. of 6-th International Conference on Intelligent Networking and Collaborative Systems, INCoS-2014;
G. Bottazzi, G. Me, “The Botnet Revenue Model”, Proc. of The 7th International Conference on Security of Information and Networks, 2014;
M. Bernaschi, M. Cianfriglia, A. Di Marco, A. Sabellico, G. Me, G. Carbone, G. Totaro, Forensic Disk Image Indexing and Search in an HPC Environment, in Proc. of The 2014 International Conference on High Performance Computing & Simulation;
F.Marturana, G.Me, S.Tacconi, “Cloud computing implications to Digital Forensics: a new methodology proposal,Seventh International Workshop on Systematic Approaches to Digital Forensic Engineering, 2012;
R.Bertè, F.Marturana, G.Me, S.Tacconi, “Triage-based Automated Analysis of Evidence in Court Cases of Copyright Infringement”, Proceedings of First IEEE International Workshop on Security and Forensics in Communication Systems (SFCS 2012), in conjunction with IEEE ICC 2012;
R. Bertè, F. Marturana, G.Me, S.Tacconi, Data mining based crime-dependent triage in digital forensics analysis, proceedings of ICACII (2012), Lecture Notes in Information Technology, pp.101-106 ;
R. Bertè, F. Marturana, G.Me, S.Tacconi, Mobile Forensics triaging: new directions for methodology, electronic proceedings of ITAIS (2011), Springer-Verlag;
R. Bertè, F. Marturana, G.Me, S.Tacconi, A quantitative approach to Triaging in Mobile Forensics, proceedings of TRUSTCOM (2011), pp. 582-588 IEEE computer society;
A. Grillo, A. Lentini, G.Me, Mobile information warfare: a countermeasure to privacy leaks based on SecureMyDroid, Proceedings of ITAIS 2010;
A. Di Stefano, G.Me, F.Pace, Android Anti-Forensics Through a Local Paradigm, Digital Forensics Research Workshop (2010), pp. S95-S103, Elsevier, (paper | pres);
A. Distefano, A. Grillo, A. Lentini, G. Me,R. Galbani, Exploitation of Secrets Injected in Java Midlets, Proc. 5th International Conference on Global Security, Safety & Sustainability, ICGS3 2009, Proceedings;
A. Grillo, A. Lentini, G. Me, M. Ottoni, Fast user classifying to establish forensic analysis priorities, Proc. 5th International Conference on IT Security Incident Management & IT Forensics, IMF 2009
F. Dellutri, V. Ottaviani, D. Bocci, G.F. Italiano, G. Me, Data reverse engineering on a smartphone, Proc. 5th International Conference on Ultra Modern Telecommunications, ICUMT 2009;
M. Bernaschi, A.Grillo, A. Lentini, G. Me, Virtual Parent: uno strumento per il controllo delle sessioni di Microsoft Messenger, Proc. Terzo workshop italiano su PRIvacy e SEcurity - PRISE 2008, Proceedings;
A.Grillo, A. Lentini, G. Me, G.F. Italiano, Transaction oriented text messaging with Trusted-SMS, Proc. of 2008 Annual Computer Security Applications Conference (ACSAC) , Preview;
A. Di Stefano, G.Me, An overall assessment of Mobile Internal Acquisition Tool, Proc. of 2008 Digital Forensic Research Workshop (DFRWS), Elsevier, pp. 121-127. Click here to view;
F.Dellutri, V. Ottaviani, G.Me, MIAT-WM5: Forensic Acquisition for Windows Mobile PocketPC, Proc. of the Workshop on Security and High Performance Computing Systems, part of the 2008 International Conference on High performance Computing & Simulation(HPCS 2008). Click here to view;
G.Me, M.Rossi, Internal forensic acquisition for mobile equipments, 4th Int'l Workshop on Security in Systems and Networks (SSN2008),Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS),2008, IEEE Computer Society Press;
A.Grillo, A. Lentini, G. Me, G.Rulli, Trusted SMS - A Novel Framework for Non-repudiable SMS-based Processes. HEALTHINF 2008: 43-50;
My papers on WLAN security for wi-fitechnology.com;
The paper "RFId security" presented at RFIDays 2008 is here (Book of Proceedings, Internal Report RR-08- 69, DISP, June, 2008) .
J. Jones, G. Me, I-C. Mihai et al., “The OSINT for Analyzing Fake News Guide”, ISBN: 978-973-0-37583-1, DOI: 10.19107/OSINT-4-FAKE-NEWS, 2022
G. Bottazzi, G. Me, “Cybercrime-funded terrorism and the threats posed by future technologies:Applealing Economics and targets”, in Terrorists’ Use of the Internet: Assessment and Response edited by M. Conway, L. Jarvis, O. Lehane IOS Press, 2017, pp. 109-126.
L. Laura, G. Me, "Searching the Web for illegal content: the anatomy of a semantic search engine", in Soft Computing, Springer, 10.1007/s00500-015-1857-4, 1432-7643, 2015
G. S. Manzi, G. Me, “Lo spostamento degli equilibri di convenienza di vittima e autore" in "Stalker,Psicopatologia del molestatore assillante", V. Caretti, G. Craparo, A. Schimmenti, ISBN: 978-88-98991-07-5, pp 67-80, 2015.
G. Bottazzi, G. Me, “Responding to cyber crime and cyber terrorism — botnets an insidious threat”, in “Cyber Crime and Cyber Terrorism Investigator's Handbook”, Elsevier’s Syngress, pp 231-257, 2014.
A. Di Stefano, A. Grillo, A. Lentini, G.Me, D. Tulimiero, Mobile Forensics Data Integrity Assessment by Event Monitoring, Digital Investigation (2010), Volume 4 Number 1, SEPTEMBER 2010, ISSN# 1941-6164, Small Scale Digital Device Forensic Journal, pp. 1-7;
A. Grillo, A. Lentini, G. Me, The B-POS secure mobile payment system, Mobile Computing (Concepts, Methodologies, Tools, and Applications), D. Taniar, 2009, Idea Group Reference, pp.1237-1245; Preview
R. Bertè, F. Dellutri, A. Grillo, A. Lentini, G. Me, V. Ottaviani, Fast smartphones forensic analysis results through MIAT and Forensic Farm, International Journal of Electronic Security and Digital Forensics, IJESDF, Inderscience, 2009;
R. Bertè, F. Dellutri, A. Grillo, A. Lentini, G. Me, V. Ottaviani, A methodology for smartphones internal memory acquisition, decoding and analysis, Handbook of Electronic Security and Digital Forensics, Editors: H. Jahankhani, D. Lilburn Watson, G. Me, Worldscience, 2009, TO APPEAR;
G. Me, D. Pirro, R. Sarrecchia, Strong authentication for financial services: PTDs as a compromise between security and usability, Mobile and Ubiquitous Commerce: Advanced E-Business Methods, Editors: Milena Head, Eldon Y. Li , Information Science Publishing, 2008, TO APPEAR, Preview ;
G. Me, P. Ruggiero, VoWLAN Security Assessment Through CVSS, VoIP Handbook: Applications, Technologies, Reliability and Security, Editors: Syed Ahson, Mohammad Ilyas , 2008, CRC Press, pp.387-403, Preview;
A. Di Stefano, G.Me, An overall assessment of Mobile Internal Acquisition Tool, Digital Investigation (2008), pp. S121-S127, Elsevier, view at DOI;
G. Me, An investigation strategy for the small paedophiles world, Encyclopedia of Information Ethics and Security, 2007, IDEA Publishing, Idea Group Reference, pp.418-425, Preview ;
A. Grillo, A. Lentini, G. Me, The B-POS secure mobile payment system, Encyclopedia of Information Ethics and Security, 2007, Idea Group Reference, pp.55-61; Preview
Gianluigi Me, M.A. Strangio, A. Schuster, Mobile local macropayments: security and prototyping, IEEE Pervasive Computing, Vol.5, No.4, pp. 94-100, Oct-Dec, 2006, Preview ;
G. Me, P. Spagnoletti, G. Italiano: GSM and GPRS performance of IPSEC data communication, e-Business and Telecommunication Networks, Ascenso, J.; Vasiu, L.; Belo, C.; Saramago, M. (Eds.), 2006, XIII, Page(s) 125-133, ISBN: 1-4020-4760-6, Springer Academic Publishers, Preview ;
Chapter 4,5,10 of "Tecnologie dell'informazione e comportamenti devianti", 2004, LED Edizioni, ISBN 88-7916-266-1 (Chapter 5,10 co-authored by R. Di Pietro), Preview ;