Get my own profile
Public access
View all31 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Maurizio TesconiHead of Cyber Intelligence Lab - IIT - CNRVerified email at iit.cnr.it
Stefano CresciIIT-CNR, ItalyVerified email at iit.cnr.it
Roberto Di PietroIEEE Fellow; ACM Distinguished Scientist; Full Professor of Cybersecurity, KAUSTVerified email at kaust.edu.sa
Rocco De NicolaProfessor of Computer Science, IMT LuccaVerified email at imtlucca.it
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Gianpiero CostantinoIIT-CNRVerified email at iit.cnr.it
Daniele SgandurraVerified email at danielesgandurra.com
Andrea SaracinoAssociate Professor at Scuola Superiore Sant'AnnaVerified email at santannapisa.it
Corrado MoisoTelecom ItaliaVerified email at telecomitalia.it
Zakaria MaamarUniversity of Doha for Science and Technology, Doha, State of QatarVerified email at udst.edu.qa
Alberto Lluch LafuenteTechnical University of DenmarkVerified email at dtu.dk
Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
José Antonio MartínPhD Student, Universidad de MálagaVerified email at lcc.uma.es
Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
Charles MorissetAssociate Professor, Durham UniversityVerified email at durham.ac.uk
Michael WilsonPrincipal Scientist, STFC Rutherford Appleton LaboratoryVerified email at stfc.ac.uk
Alvaro ArenasProfesor de Sistemas de Información y TecnologíasVerified email at ie.edu