Get my own profile
Public access
View all41 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Andrea PoliniUniversity of CamerinoVerified email at unicam.it
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
Paola InverardiProfessor of computer science, Gran Sasso Science InstituteVerified email at gssi.it
Antonello CalabròIstituto di Scienza e Tecnologie dell'Informazione "A.Faedo" - ISTI - CNRVerified email at isti.cnr.it
Raffaela MirandolaFull Professor, Karlsruhe Institute of TechnologyVerified email at kit.edu
Henry MucciniFull Professor in Computer Science, FrAmeLab, University of L'AquilaVerified email at univaq.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Hong ZhuOxford Brookes UniversityVerified email at brookes.ac.uk
Massimo TivoliFull Professor, Dipartimento di Ingegneria e Scienze dell'Informazione e Matematica (DISIM)Verified email at univaq.it
Stefania GnesiISTI-CNR, ItalyVerified email at isti.cnr.it
Antinisca Di MarcoAssociate Professor at Università degli Studi di L'AquilaVerified email at univaq.it
Stefano RussoProfessor of Computer Engineering, Università di Napoli Federico IIVerified email at unina.it
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Roberto PietrantuonoUniversity of Naples Federico IIVerified email at unina.it
Marco AutiliProfessore Associato, Università dell'AquilaVerified email at univaq.it
Javier TuyaUniversity of OviedoVerified email at uniovi.es
Miguel Angel OliveroLSI-USVerified email at us.es
Fabio MartinelliConsiglio Nazionale delle RicercheVerified email at iit.cnr.it