Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Eda MarchettiISTI-CNRVerified email at isti.cnr.it
Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
Said DaoudaghCNR - ISTIVerified email at isti.cnr.it
Francesca MartelliIstituto di Informatica e Telematica (CNR)Verified email at iit.cnr.it
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Antinisca Di MarcoAssociate Professor at Universitŕ degli Studi di L'AquilaVerified email at univaq.it
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Dr. Tejeddine Mouelhiresearcher in Software EngineeringVerified email at uni.lu
Yves Le TraonProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
Micael GallegoUniversidad Rey Juan CarlosVerified email at urjc.es
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Francisco GortázarUniversidad Rey Juan CarlosVerified email at urjc.es
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Gaetano GiuntaFull Professor of Telecommunications, University of Roma Tre, Chair of Digital Signal ProcessingVerified email at uniroma3.it
Donia EL KATEBuniversity of LuxembourgVerified email at uni.lu
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Denitsa ManovaStudent, SU "Kliment Ohridski"Verified email at uni-sofia.bg
Mike PapadakisAssociate professor, University of LuxembourgVerified email at uni.lu