Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Eda MarchettiISTI-CNRVerified email at isti.cnr.it
Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
Said DaoudaghUniversity of Pisa, CNR - ISTIVerified email at isti.cnr.it
Francesca MartelliIstituto di Informatica e Telematica (CNR)Verified email at iit.cnr.it
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Antinisca Di MarcoAssociate Professor at Universitŕ degli Studi di L'AquilaVerified email at univaq.it
Tejeddine Mouelhiresearcher in Software EngineeringVerified email at uni.lu
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Yves Le TraonProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
Micael GallegoUniversidad Rey Juan CarlosVerified email at urjc.es
Francisco GortázarUniversidad Rey Juan CarlosVerified email at urjc.es
Donia EL KATEBuniversity of LuxembourgVerified email at uni.lu
Gaetano GiuntaFull Professor of Telecommunications, University of Roma Tre, Chair of Digital Signal ProcessingVerified email at uniroma3.it
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Denitsa ManovaStudent, SU "Kliment Ohridski"Verified email at uni-sofia.bg
Claudio PompilioPh.D. Student in Computer Science at University of L'AquilaVerified email at graduate.univaq.it