Get my own profile
Public access
View all35 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Paola InverardiProfessor of Computer ScienceVerified email at univaq.it
Antonello CalabròISTI CNRVerified email at isti.cnr.it
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Raffaela MirandolaAssociate Professor, Politecnico di MilanoVerified email at elet.polimi.it
Henry MucciniFull Professor in Computer Science, University of L'AquilaVerified email at univaq.it
Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
Antonino SabettaSAP Security ResearchVerified email at sap.com
Dr. J. Jenny LiNSF Program Director, Associate Professor of Computer Science, Kean UniversityVerified email at kean.edu
Hong ZhuOxford Brookes UniversityVerified email at brookes.ac.uk
Massimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
Stefania GnesiISTI-CNR, ItalyVerified email at isti.cnr.it
Antinisca Di MarcoAssociate Professor at Università degli Studi di L'AquilaVerified email at univaq.it
Marco AutiliProfessore Associato, Università dell'AquilaVerified email at univaq.it
Stefano RussoProfessor of Computer Engineering, Università di Napoli Federico IIVerified email at unina.it
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Emilio CrucianiPostdoctoral Researcher, Paris-Lodron University of SalzburgVerified email at sbg.ac.at
Roberto PietrantuonoUniversity of Naples Federico IIVerified email at unina.it