Get my own profile
Public access
View all10 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Eda MarchettiISTI-CNRVerified email at isti.cnr.it
- Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
- Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
- Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
- Francesco FurfariISTI CNR , ItalyVerified email at isti.cnr.it
- Paolo BarsocchiSenior Researcher @ ISTI-CNRVerified email at isti.cnr.it
- Antonino CrivelloInformation Science and Technologies Institute (ISTI - CNR)Verified email at isti.cnr.it
- Paolo MoriIstituto di Informatica e Telematica - Consiglio Nazionale delle RicercheVerified email at iit.cnr.it
- Fabio MartinelliConsiglio Nazionale delle RicercheVerified email at cnr.it
- Donia EL KATEBuniversity of LuxembourgVerified email at uni.lu
- Dr. Tejeddine Mouelhiresearcher in Software EngineeringVerified email at uni.lu
- Emilia CioroaicaFraunhofer IESEVerified email at iese.fraunhofer.de
- Mike PapadakisAssociate professor, University of LuxembourgVerified email at uni.lu
- Yves Le TraonProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
- Nora KochUniversidad de Sevilla, LMUVerified email at iwt2.org