Get my own profile
Public access
View all30 articles
6 articles
available
not available
Based on funding mandates
Co-authors
- Maurizio TesconiHead of Cyber Intelligence Lab - IIT - CNRVerified email at iit.cnr.it
- Stefano CresciIIT-CNR, ItalyVerified email at iit.cnr.it
- Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
- Rocco De NicolaProfessor of Computer Science, IMT LuccaVerified email at imtlucca.it
- Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
- Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
- Daniele SgandurraVerified email at danielesgandurra.com
- Andrea SaracinoAssociate Professor at Scuola Superiore Sant'AnnaVerified email at santannapisa.it
- Corrado MoisoTelecom ItaliaVerified email at telecomitalia.it
- Zakaria MaamarUniversity of Doha for Science and Technology, Doha, State of QatarVerified email at udst.edu.qa
- Alberto Lluch LafuenteTechnical University of DenmarkVerified email at dtu.dk
- Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
- José Antonio MartínPhD Student, Universidad de MálagaVerified email at lcc.uma.es
- Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
- Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
- Charles MorissetReader in Security, Newcastle UniversityVerified email at ncl.ac.uk
- Alvaro ArenasProfesor de Sistemas de Información y TecnologíasVerified email at ie.edu
- Michael WilsonPrincipal Scientist, STFC Rutherford Appleton LaboratoryVerified email at stfc.ac.uk