Get my own profile
Public access
View all7 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Eda MarchettiISTI-CNRVerified email at isti.cnr.it
Antonia BertolinoISTI-CNRVerified email at isti.cnr.it
Francesca LonettiCNR - ISTIVerified email at isti.cnr.it
Antonino SabettaSAP Security ResearchVerified email at sap.com
Guglielmo De AngelisCNR-IASIVerified email at cnr.it
Antinisca Di MarcoAssociate Professor at Universitą degli Studi di L'AquilaVerified email at univaq.it
Said DaoudaghUniversity of Pisa, CNR - ISTIVerified email at isti.cnr.it
Nicola NostroRAMS Engineer at ResilTech srlVerified email at unifi.it
Maik MertenTeacher, Federal University of Applied Administrative SciencesVerified email at tu-dortmund.de
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Fabio MartinelliConsiglio Nazionale delle RicercheVerified email at iit.cnr.it
Bernhard SteffenProfessor für Informatik, TU DortmundVerified email at cs.uni-dortmund.de
Cesare BartoliniSnT - Interdisciplinary Centre for Security, Reliability and TrustVerified email at uni.lu
Barbara LeporiniISTI-CNRVerified email at isti.cnr.it
Francesco FurfariISTI CNR , ItalyVerified email at isti.cnr.it
Antonino CrivelloInformation Science and Technologies Institute (ISTI - CNR)Verified email at isti.cnr.it
Michele GirolamiInformation Science and Technologies Institute ISTI - CNRVerified email at isti.cnr.it
Breno MirandaAssistant Professor, Federal University of PernambucoVerified email at cin.ufpe.br
rachid saadiWithingsVerified email at withings.com
Francisco GortįzarUniversidad Rey Juan CarlosVerified email at urjc.es
Follow

Antonello Calabrņ
Istituto di Scienza e Tecnologie dell'Informazione "A.Faedo" - ISTI - CNR
Verified email at isti.cnr.it