Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eda MarchettiISTI-CNRVerified email at isti.cnr.it
Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
Said DaoudaghCNR - ISTIVerified email at isti.cnr.it
Francesca MartelliIstituto di Informatica e Telematica (CNR)Verified email at iit.cnr.it
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Antinisca Di MarcoAssociate Professor at Università degli Studi di L'AquilaVerified email at univaq.it
Dr. Tejeddine Mouelhiresearcher in Software EngineeringVerified email at uni.lu
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Yves Le TraonProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Micael GallegoUniversidad Rey Juan CarlosVerified email at urjc.es
Francisco GortázarUniversidad Rey Juan CarlosVerified email at urjc.es
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Gaetano GiuntaFull Professor of Telecommunications, University of Roma Tre, Chair of Digital Signal ProcessingVerified email at uniroma3.it
Donia EL KATEBuniversity of LuxembourgVerified email at uni.lu
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Denitsa ManovaStudent, SU "Kliment Ohridski"Verified email at uni-sofia.bg
Claudio PompilioTechnologist at Gran Sasso Science InstituteVerified email at gssi.it