Get my own profile
Public access
View all32 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Maurizio TesconiHead of Cyber Intelligence Lab - IIT - CNRVerified email at iit.cnr.it
Stefano CresciIIT-CNR, ItalyVerified email at iit.cnr.it
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, HBKU-College of ScienceVerified email at hbku.edu.qa
Rocco De NicolaProfessor of Computer Science, IMT LuccaVerified email at imtlucca.it
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
Daniele SgandurraVerified email at danielesgandurra.com
Andrea SaracinoIstituto di Informatica e Telematica, Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Corrado MoisoTelecom ItaliaVerified email at telecomitalia.it
Zakaria MaamarUniversity of Doha for Science and Technology, Doha, State of QatarVerified email at udst.edu.qa
Alberto Lluch LafuenteTechnical University of DenmarkVerified email at dtu.dk
José Antonio MartínPhD Student, Universidad de MálagaVerified email at lcc.uma.es
Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Charles MorissetSenior Lecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Michael WilsonPrincipal Scientist, STFC Rutherford Appleton LaboratoryVerified email at stfc.ac.uk
Alvaro ArenasProfesor de Sistemas de Información y TecnologíasVerified email at ie.edu