[20.] P. Baglietto, M. Migliardi, M. Maresca, N. Zingirian, Valutazione dei Requisiti Computazionali di Programmi per la Decodifica di Video Sequenze MPEG, (in Italian), Pixel, Year 16, N. 8/9, October 1995.

[21.] P. Baglietto, A. L. Frisiani, M. Maresca, M. Migliardi, Polymorphic Parallel C: un linguaggio di Supporto alla Programmazione Logica su Array Riconfigurabili di Processori, (in Italian) Processori Dedicati, Collana CNR/Progetto Finalizzato Sistemi Informatici e Calcolo Parallelo, Franco Angeli Editore, 1995, pp. 26-31.

[24.] P. Baglietto, M. Maresca, M. Migliardi, N. Zingirian, Image Processing on High Performance RISC Systems, Proceedings of IEEE July 1996, Vol. 84 N. 7, pgg 917-930.

[37.] M. Beck, J. Dongarra, G. Fagg, A. Geist, P. Gray, J. Kohl, M. Migliardi, K. Moore, T. Moore, P. Papadopoulos, S. Scott and V. Sunderam, HARNESS: A Next Generation Distributed Virtual Machine, Special Issue on Metacomputing, Future Generation Computer Systems, Elsevier Publ. Vol 15, No. 5/6, 1999.

[38.] M. Migliardi, An Efficiency Model for General Purpose Instruction Level Parallel Architectures in Image Processing, Computers & Electrical Engineering an International Journal, Special Issue on Performance Evaluation of High Performance Computer Systems, Elsiever Science, April 2000, Vol. 26, Issue 3/4, pgg. 245-259.

[46.] M. Migliardi, V. Sunderam, Plug-ins, Layered Services and Behavioral Objects: Application Programming Styles in the Harness Metacomputing System, Future Generation Computer Systems, Elsevier Publ. April 2001, Vol 17, No. 6, pgg 795-811.

[49.] V. Sunderam, S. Y. Cheung, S. Chodrow, P. Gray, M. Grigni, M. Hirsch, P. Hutto, A. Krantz, S. Olesen, I. Rhee, T. Goddard, J. Sult, M. Migliardi, L. Marzilli, S. Ano, K. Williams, and S. Sullivan, CCF: A Framework for Collaborative Computing, IEEE Internet Computing, vol. 4, N. 1 Jan-Feb 2000, pgg. 16-24.

[50.] M. Migliardi, S. Schubiger, V. Sunderam, A Distributed JAVA SPACE Implementation for HARNESS, Journal of Parallel and Distributed Computing, Vol. 60, No. 10, Oct 2000, pp. 1325-1340, Academic Press.

[59] M. Migliardi, V. Sunderam, Emulating Parallel Programming Environments in the Harness Metacomputing System, Parallel Processing Letters, Vol. 11, Nos. 2 & 3, June & September 2001.

[67] M. Migliardi, M. Maheswaran, B. Maniymaran, P. Card, F. Azzedin, Mobile interfaces to computational, data, and service grid systems , October 2002, ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 6 No. 4

[75] Mauro Migliardi, Grid Computing: da dove viene e che cosa manca perche' diventi una realta'?, Mondo Digitale, N. 2, June 2004, pgg. 21-31

[76] Mauro Migliardi, Roberto Podesta', Tutto sul Grid Computing, Wireless: Tecnologie per il management dei processi aziendali, N. 62, Anno 8, Gennaio/Febbraio 2007, pgg. 58-63

[87] Mauro Migliardi and Roberto Podesta', Cloud Computing Evoluzionario e Rivoluzionario, Mondo Digitale, N. 33, March 2010, pgg. 16-26.

[88] Luca Caviglione, Mauro Migliardi and Roberto Podesta', Peer-to-peer oltre il File-Sharing, Mondo Digitale, N. 37, March 2011, pgg. 25-35.

[93] Mauro Migliardi, Marco Gaudina, Social Web: Prospettive e Considerazioni, Mondo Digitale, N. 40, December 2011.

[95] Mauro Migliardi, Marco Gaudina, Sistemi di supporto alla memoria: dall'agenda cartacea ai personal information manager attivi, Mondo Digitale, N. 41, March 2012

[99] Luca Caviglione, Alessio Merlo, Mauro Migliardi, Green-Aware Security: Towards a new Research Field, the International Journal of Information Assurance and Security (JIAS), Vol. 7, 2012, issue 5, pp. 338-346.

[100] Mauro Migliardi, Marco Gaudina, Andrea Brogni, Pervasive Services and Mobile Devices May Support Human Memory and Enhance Daily Efficiency, International Journal of Space-Based and Situated Computing (IJSSC), Vol. 2, No. 3, 2012.

[101] Mauro Migliardi, Vittorio Viarengo, Virtualizzazione: evoluzione verso la “nuvola”, Mondo Digitale, N. 42, June 2012.

[103] Luca Caviglione, Alessio Merlo, Mauro Migliardi, Green Security: risparmio energetico e sicurezza, Mondo Digitale, N. 44, December 2012.

[105] Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame, Breaking and fixing the Android Launching Flow, Computers & Security, (2013), http://dx.doi.org/10.1016/j.cose.2013.03.009

[108] Mauro Migliardi, Marco Gaudina, Memory Support through Pervasive and Mobile Systems, in Inter-Cooperative Collective Intelligence: Techniques and Applications, SPRINGER SERIES: Studies in Computational Intelligence, 2013, ISBN 978-3-642-35015-3

[111] Mauro Migliardi, Alessio Merlo, Improving Energy Efficiency in Distributed Intrusion Detection Systems, Journal of High Speed Networks, IoS Press, pgg. 251-264, Volume 19, Number 3 / 2013, DOI 10.3233/JHS-130476.

[112] Mauro Migliardi, Alessio Merlo, Dispositivi Mobili: Nuovi Problemi di Sicurezza, Mondo Digitale, N. 48, December 2013.

[113] Alessio Merlo, Mauro Migliardi, Nicola Gobbo, Francesco Palmieri, Aniello Castiglione, A Denial of Service Attack to UMTS Networks Using SIM-less Devices, IEEE Transactions on Dependable and Secure Computing, pp. 280-291, Vol. 11, N.3, May-June 2014, http://dx.doi.org/10.1109/TDSC.2014.2315198

[118] S. Al-Haj Baddar, A. Merlo, M. Migliardi, Anomaly Detection in Computer Networks: A State-of-the-Art Review, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 5, Number 4 (December 2014).

[119] M. Migliardi, C. Degano and M. Tettamanti. "Fostering Independent Living in the Aging Population through Proactive Paging." Advanced Technological Solutions for E-Health and Dementia Patient Monitoring. IGI Global, 2015. 239-271. Web. 13 Apr. 2015. doi:10.4018/978-1-4666-7481-3.ch010

[120] A. Merlo, M. Migliardi, L. Caviglione, A survey on energy-aware security mechanisms, Pervasive and Mobile Computing, Elsevier, Volume 24 , December 2015, Pages 77–90 , doi:10.1016/j.pmcj.2015.05.005

[123] A. Merlo, M. Migliardi, P. Fontanelli, Measuring and estimating power consumption in Android to support energy-based intrusion detection, Journal of Computer Security, vol. 23, pp. 611-637, 2015, DOI: 10.3233/JCS-150530

[126] S. Al-Haj Baddar, A. Merlo, M. Migliardi, Generating statistical insights into network behavior using SKETURE, Journal of High Speed Networks, vol. 22, no. 1, pp. 65-76, 2016. DOI: 10.3233/JHS-160539

[128] A. Merlo, M. Migliardi, E. Spadacini, IPS-based reduction of network energy consumption, Logic Journal of IGPL, in press, DOI: 10.1093/jigpal/jzw053

[129] M. Guerar, M. Migliardi, A. Merlo, M. Benmohammed, F. Palmieri, A. Castiglione, Using Screen Brightness to Improve Security in Mobile Social Network Access, IEEE Transactions on Dependable and Secure Computing. Year: 2016, Volume: PP, Issue: 99. DOI: 10.1109/TDSC.2016.2601603

[132] M. Guerar, A. Merlo, M. Migliardi, Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices, Future Generation Computer Systems, March 2017, http://dx.doi.org/10.1016/j.future.2017.03.012

[134] Guerar M., Merlo A., Migliardi M., ClickPattern: A Pattern Lock System Resilient to Smudge and Side-channel Attacks, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 8, Issue 2, June 2017, pgg. 64 -78, DOI:10.22670/JOWUA.2017.06.31.06

[136] Migliardi M., Merlo A., Baddar S.AH, Adaptive Mobile Computing: Advances in Processing Mobile Data Sets; Academic Press, 262 pgg., 1st Edition 15th August 2017, ISBN 9780128046036

[137] S. Aonzo, A. Merlo, M. Migliardi, L. Oneto, F. Palmieri, Low-Resource Footprint, Data-Driven Malware Detection on Android, IEEE Transactions on Sustainable Computing,in press, DOI:10.1109/TSUSC.2017.2774184

[138] Al Haj Baddar S., Merlo A., Migliardi M., Palmieri F., Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition, Computers & Security, Volume 76, July 2018, Pages 311-326  , DOI: 10.1016/j.cose.2017.12.003

[139] M. Guerar, A. Merlo, M. Migliardi, F. Palmieri, Invisible CAPPCHA: A Usable Mechanism to Distinguish Between Malware and Humans on the mobile IoT, Computers & Security, Received 27 February 2018, Revised 19 June 2018, Accepted 21 June 2018, Available online 20 July 2018, DOI:10.1016/j.cose.2018.06.007

[143] S. Al-Haj Baddar, A. Merlo and M. Migliardi, "Behavioral-Anomaly Detection in Forensics Analysis," in IEEE Security & Privacy, vol. 17, no. 1, pp. 55-62, Jan.-Feb. 2019. doi: 10.1109/MSEC.2019.2894917

[146] M. Guerar, M. Migliardi, F. Palmieri, L. Verderame, A. Merlo, Securing PIN-based Authentication in Smartwatches With just Two Gestures. Concurrency and Computation: Practice and Experience, Article published in Early View on 16 November, 2019, DOI: 10.1002/cpe.5549 .

[147] Meriem Guerar, Luca Verderame, Alessio Merlo, Francesco Palmieri, Mauro Migliardi, and Luca Vallerini. 2020. CirclePIN: A Novel Authentication Mechanism for Smartwatches to Prevent Unauthorized Access to IoT Devices. ACM Trans. Cyber-Phys. Syst. 4, 3, Article 34 (March 2020), 19 pages. DOI:https://doi.org/10.1145/3365995

[148] M. Guerar, A. Merlo, M. Migliardi, F. Palmieri and L. Verderame, "A Fraud-Resilient Blockchain-Based Solution for Invoice Financing," in IEEE Transactions on Engineering Management (Early Access). Published on March 02, 2020. pgg. 1-13, DOI: 10.1109/TEM.2020.2971865