Get my own profile
Public access
View all28 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Paolo GiorginiProfessor of Computer Science, University of TrentoVerified email at unitn.it
andrea bondavalliProfessor of computer science, University of FirenzeVerified email at unifi.it
John MylopoulosUniversity of OttawaVerified email at cs.toronto.edu
Paolo LolliniUniversity of Florence - Dept. of Mathematics and Computer ScienceVerified email at unifi.it
Andrea CeccarelliAssociate Professor at University of FlorenceVerified email at unifi.it
Kuldar TaveterResearcher and Educator at the University of Tartu, EstoniaVerified email at ut.ee
Elda PajaAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Mattia SalnitriAssociate professor at University of BergamoVerified email at unibg.it
Haralambos MouratidisDirector, Institute for Analytics and Data Science (IADS), University of EssexVerified email at essex.ac.uk
Michalis PavlidisPrincipal Lecturer in Cyber Security, University of BrightonVerified email at brighton.ac.uk
Jose Fran. RuizAtosVerified email at atos.net
Kerli MoosesUniversity of TartuVerified email at ut.ee
Tahira IqbalUniversity of TartuVerified email at ut.ee
Susanna DonatelliComputer Science Professor, Universita' di Torino (Italy)Verified email at di.unito.it
Elvio Gilberto AmparoreUniversitą di TorinoVerified email at di.unito.it
Hina AnwarInstitute of Computer Science, University of TartuVerified email at ut.ee
Leandro Dias da SilvaUniversidade Federal de AlagoasVerified email at ic.ufal.br
Hanna KavalionakHPC, ISTI-CNR, PisaVerified email at isti.cnr.it